In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association.
References
| Link | Resource |
|---|---|
| https://link.springer.com/article/10.1007/s10207-025-00988-3 | Third Party Advisory |
| https://w1.fi/cgit/hostap/commit/?id=15af83cf1846870873a011ed4d714732f01cd2e4 | Patch |
Configurations
History
23 Oct 2025, 18:32
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
W1.fi hostapd
W1.fi |
|
| CPE | cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* | |
| References | () https://link.springer.com/article/10.1007/s10207-025-00988-3 - Third Party Advisory | |
| References | () https://w1.fi/cgit/hostap/commit/?id=15af83cf1846870873a011ed4d714732f01cd2e4 - Patch | |
| Summary |
|
12 Feb 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-323 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
11 Feb 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-11 23:15
Updated : 2025-10-23 18:32
NVD link : CVE-2022-37660
Mitre link : CVE-2022-37660
CVE.ORG link : CVE-2022-37660
JSON object : View
Products Affected
w1.fi
- hostapd
CWE
CWE-323
Reusing a Nonce, Key Pair in Encryption
