A flaw was found in the implementation of EAP-pwd in FreeRADIUS. An attacker could initiate several EAP-pwd handshakes to leak information, which can then be used to recover the user's WiFi password by performing dictionary and brute-force attacks. References: https://wpa3.mathyvanhoef.com/#new
Created freeradius tracking bugs for this issue: Affects: fedora-all [bug 1737664]
Upstream patch: https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa
EAP-PWD support was first added in freeradius 3.0.0, so earlier versions as shipped in Red Hat Enterprise Linux 6 and earlier are not affected.
Statement: This issue did not affect the versions of freeradius as shipped with Red Hat Enterprise Linux 5, and 6 as they did not include support for EAP-pwd.
Given a random EAP-pwd token an attacker can learn if all 10 iterations of the compute_password_element() function failed. This happens once every 2048 handshakes and in that case an error frame is sent to the client. This information could be abused by an attacker to brute force the password, as in the Dragonblood attack.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1672 https://access.redhat.com/errata/RHSA-2020:1672
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-13456
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3984 https://access.redhat.com/errata/RHSA-2020:3984