In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association.
                
            References
                    Configurations
                    History
                    03 Nov 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
23 Oct 2025, 18:32
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        W1.fi hostapd
         W1.fi  | 
|
| References | () https://link.springer.com/article/10.1007/s10207-025-00988-3 - Third Party Advisory | |
| References | () https://w1.fi/cgit/hostap/commit/?id=15af83cf1846870873a011ed4d714732f01cd2e4 - Patch | |
| CPE | cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* | |
| Summary | 
        
        
  | 
12 Feb 2025, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-323 | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 6.5  | 
11 Feb 2025, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-11 23:15
Updated : 2025-11-03 20:15
NVD link : CVE-2022-37660
Mitre link : CVE-2022-37660
CVE.ORG link : CVE-2022-37660
JSON object : View
Products Affected
                w1.fi
- hostapd
 
CWE
                
                    
                        
                        CWE-323
                        
            Reusing a Nonce, Key Pair in Encryption
