An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service.
A feature, API, or function does not perform according to its specification.
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0850 | third party advisory |