CVE-2022-37660 - Hostapd PKEX Public Key Exposure Vulnerability
CVE ID : CVE-2022-37660 Published : Feb. 11, 2025, 11:15 p.m. | 2 hours, 30 minutes ago Description : In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...
![CVE-2022-37660 - Hostapd PKEX Public Key Exposure Vulnerability](https://cdn.cvefeed.io/images/cvefeed.io-new.webp)
Published : Feb. 11, 2025, 11:15 p.m. | 2 hours, 30 minutes ago
Description : In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...