{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-23304","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2025-11-03T19:26:48.111Z","dateReserved":"2022-01-17T00:00:00.000Z","datePublished":"2022-01-17T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-09-30T10:06:20.892Z"},"descriptions":[{"lang":"en","value":"The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://w1.fi/security/2022-1/"},{"name":"FEDORA-2022-da8222a1bc","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPDHU5MV464CZBPX7N2SNMUYP6DFIBZL/"},{"name":"GLSA-202309-16","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202309-16"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://w1.fi/security/2022-1/","tags":["x_transferred"]},{"name":"FEDORA-2022-da8222a1bc","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPDHU5MV464CZBPX7N2SNMUYP6DFIBZL/"},{"name":"GLSA-202309-16","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202309-16"},{"url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00019.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:26:48.111Z"}}]}}