Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-52161

Опубликовано: 22 фев. 2024
Источник: debian
EPSS Низкий

Описание

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
iwdfixed2.14-1package

Примечания

  • https://www.top10vpn.com/research/wifi-vulnerabilities/

  • https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=6415420f1c92012f64063c131480ffcef58e60ca (2.14)

EPSS

Процентиль: 37%
0.00153
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

CVSS3: 7.5
nvd
больше 1 года назад

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

CVSS3: 7.5
github
больше 1 года назад

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость функции eapol_auth_key_handle демона iNet Wireless, позволяющая нарушителю подключиться к защищённой Wi-Fi-сети

EPSS

Процентиль: 37%
0.00153
Низкий