The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
|
History
10 Mar 2024, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Mar 2024, 22:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-287 | |
| First Time |
Fedoraproject
Redhat Google android W1.fi wpa Supplicant Linux W1.fi Debian debian Linux Linux linux Kernel Redhat enterprise Linux Fedoraproject fedora Debian Google chrome Os |
|
| References | () https://lists.debian.org/debian-lts-announce/2024/02/msg00013.html - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/ - Mailing List | |
| References | () https://w1.fi/cgit/hostap/commit/?id=8e6485a1bcb0baffdea9e55255a81270b768439c - Patch | |
| References | () https://www.top10vpn.com/research/wifi-vulnerabilities/ - Third Party Advisory |
27 Feb 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Feb 2024, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
22 Feb 2024, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks. |
22 Feb 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-22 17:15
Updated : 2024-03-10 04:15
NVD link : CVE-2023-52160
Mitre link : CVE-2023-52160
CVE.ORG link : CVE-2023-52160
JSON object : View
Products Affected
fedoraproject
- fedora
- android
- chrome_os
redhat
- enterprise_linux
linux
- linux_kernel
w1.fi
- wpa_supplicant
debian
- debian_linux
CWE
CWE-287
Improper Authentication
