The wimax package installs a RSA private key in /usr/share/wimax/supplicant_key.pem. We should never ship hard-coded private keys. The embedded CA certificate in /usr/share/wimax/cacert.pem is suspicious as well. It is unclear how device key management is supposed to work.
A security flaw was found in the way supplicant agent of WiMAX, an user space daemon for the Intel 2400m Wireless WiMAX link, used to manage its private key (private key was shipped together with the source code). A local attacker could use this flaw to obtain security sensitive data or, to conduct actions on behalf of private key owner.
Acknowledgements: This issue was found by Florian Weimer of Red Hat Product Security Team.
Created wimax tracking bugs for this issue: Affects: fedora-all [bug 995160]
CVE Request: http://www.openwall.com/lists/oss-security/2013/08/08/10
The CVE identifier of CVE-2013-4218 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2013/08/08/17
Only Fedora 19 shipped the wimax packages, and it is now EOL.