Vulnerability Details CVE-2016-4476
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 65.5%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2016-4476
-
cpe:2.3:a:w1.fi:hostapd:0.6.7
-
cpe:2.3:a:w1.fi:hostapd:0.7.0
-
cpe:2.3:a:w1.fi:hostapd:0.7.1
-
cpe:2.3:a:w1.fi:hostapd:0.7.2
-
cpe:2.3:a:w1.fi:hostapd:0.7.3
-
cpe:2.3:a:w1.fi:hostapd:1.1
-
cpe:2.3:a:w1.fi:hostapd:2.0
-
cpe:2.3:a:w1.fi:hostapd:2.1
-
cpe:2.3:a:w1.fi:hostapd:2.2
-
cpe:2.3:a:w1.fi:hostapd:2.3
-
cpe:2.3:a:w1.fi:hostapd:2.4
-
cpe:2.3:a:w1.fi:hostapd:2.5
-
cpe:2.3:a:w1.fi:wpa_supplicant:0.6.10
-
cpe:2.3:a:w1.fi:wpa_supplicant:0.6.7
-
cpe:2.3:a:w1.fi:wpa_supplicant:0.6.8
-
cpe:2.3:a:w1.fi:wpa_supplicant:0.6.9
-
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.0
-
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.1
-
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.2
-
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3
-
cpe:2.3:a:w1.fi:wpa_supplicant:0.72
-
cpe:2.3:a:w1.fi:wpa_supplicant:1.0
-
cpe:2.3:a:w1.fi:wpa_supplicant:1.1
-
cpe:2.3:a:w1.fi:wpa_supplicant:2.0
-
cpe:2.3:a:w1.fi:wpa_supplicant:2.0-16
-
cpe:2.3:a:w1.fi:wpa_supplicant:2.1
-
cpe:2.3:a:w1.fi:wpa_supplicant:2.2
-
cpe:2.3:a:w1.fi:wpa_supplicant:2.3
-
cpe:2.3:a:w1.fi:wpa_supplicant:2.4
-
cpe:2.3:a:w1.fi:wpa_supplicant:2.5
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:17.04