Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Wi-Fi Alliance — Vulnerabilities & Security Advisories 15

Browse all 15 CVE security advisories affecting Wi-Fi Alliance. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Wi-Fi Alliance develops and certifies wireless networking standards to ensure interoperability across devices. Historically, their implementations have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, with 15 CVEs currently documented. Security researchers have identified weaknesses in protocols like WPA2 and WPA3, including the KRACK attack, which allowed decryption of traffic. While no major breaches have been directly attributed to the organization, these vulnerabilities have impacted billions of devices worldwide. The Alliance continues to address security flaws through updated certification requirements, though legacy vulnerabilities remain in deployed systems.

CVE IDTitleCVSSSeverityPublished
CVE-2019-9494 The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side-channel attacks — hostapd with SAE supportCWE-208 5.9 -2019-04-17
CVE-2019-9495 The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns — hostapd with EAP-pwd supportCWE-524 5.9 -2019-04-17
CVE-2019-9496 An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps — hostapd with SAE supportCWE-642 7.5 -2019-04-17
CVE-2019-9497 The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit — hostapd with EAP-pwd supportCWE-301 9.8 -2019-04-17
CVE-2019-9498 The implementations of EAP-PWD in hostapd EAP Server do not validate the scalar and element values in EAP-pwd-Commit — hostapd with EAP-pwd supportCWE-346 8.1 -2019-04-17
CVE-2019-9499 The implementations of EAP-PWD in wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit — hostapd with EAP-pwd supportCWE-346 8.1 -2019-04-17
CVE-2017-13078 WPA和WPA2 安全特征问题漏洞 — Wi-Fi Protected Access (WPA and WPA2)CWE-323 5.3 -2017-10-17
CVE-2017-13079 WPA和WPA2 安全特征问题漏洞 — Wi-Fi Protected Access (WPA and WPA2)CWE-323 5.3 -2017-10-17
CVE-2017-13080 Intel PROSet/Wireless WiFi Software 安全特征问题漏洞 — Wi-Fi Protected Access (WPA and WPA2)CWE-323 5.3 -2017-10-17
CVE-2017-13081 WPA和WPA2 安全特征问题漏洞 — Wi-Fi Protected Access (WPA and WPA2)CWE-323 5.3 -2017-10-17
CVE-2017-13082 WPA和WPA2 安全特征问题漏洞 — Wi-Fi Protected Access (WPA and WPA2)CWE-323 6.8 -2017-10-17
CVE-2017-13084 WPA和WPA2 安全特征问题漏洞 — Wi-Fi Protected Access (WPA and WPA2)CWE-323 6.8 -2017-10-17
CVE-2017-13086 WPA和WPA2 安全特征问题漏洞 — Wi-Fi Protected Access (WPA and WPA2)CWE-323 6.8 -2017-10-17
CVE-2017-13088 WPA和WPA2 安全特征问题漏洞 — Wi-Fi Protected Access (WPA and WPA2)CWE-323 5.3 -2017-10-17
CVE-2017-13077 WPA和WPA2 安全特征问题漏洞 — Wi-Fi Protected Access (WPA and WPA2) 6.8 -2017-10-17

This page lists every published CVE security advisory associated with Wi-Fi Alliance. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.