1 vulnerabilities classified as CWE-301 (认证协议中的反射攻击). AI Chinese analysis included.
CWE-301 represents a critical authentication weakness where an attacker exploits a symmetric key protocol to impersonate a trusted user. This vulnerability typically arises in mutual authentication schemes that use identical pre-shared keys for multiple connections. An adversary intercepts a challenge from a target system and reflects it back to the same or another instance of the target, tricking the system into authenticating the attacker as a legitimate peer. By reusing the same cryptographic material across different communication channels, the protocol fails to distinguish between the initiator and responder roles effectively. Developers mitigate this risk by implementing distinct keys for each direction of communication or by incorporating unique identifiers, such as nonces or session IDs, into the authentication handshake. This ensures that a challenge generated for one party cannot be successfully reused by an attacker to authenticate themselves, thereby preserving the integrity of the mutual verification process.
unsigned char *simple_digest(char *alg,char *buf,unsigned int len, int *olen) { const EVP_MD *m; EVP_MD_CTX ctx; unsigned char *ret; OpenSSL_add_all_digests(); if (!(m = EVP_get_digestbyname(alg))) return NULL; if (!(ret = (unsigned char*)malloc(EVP_MAX_MD_SIZE))) return NULL; EVP_DigestInit(&ctx, m); EVP_DigestUpdate(&ctx,buf,len); EVP_DigestFinal(&ctx,ret,olen); return ret; } unsigned char *generate_password_and_cmd(char *password_and_cmd) { simple_digest("sha1",password,strlen(password_and_cmd) ... ); }String command = new String("some cmd to execute & the password") MessageDigest encer = MessageDigest.getInstance("SHA"); encer.update(command.getBytes("UTF-8")); byte[] digest = encer.digest();| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2019-9497 | The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit — hostapd with EAP-pwd support | 9.8 | - | 2019-04-17 |
Vulnerabilities classified as CWE-301 (认证协议中的反射攻击) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.