Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-52160

Опубликовано: 16 фев. 2024
Источник: redhat
CVSS3: 6.5

Описание

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.

A flaw was found in wpa_supplicant's implementation of PEAP. This issue may allow an attacker to skip the second phase of authentication when the target device has not been properly configured to verify the authentication server. By skipping the second phase of authentication, it’s easier for an attacker to create a rogue clone of a trusted WiFi network to trick the victim into connecting, all without knowing their password.

Отчет

While the flaw in wpa_supplicant's implementation of PEAP authentication represents a concerning security vulnerability, its classification as a moderate severity issue is based on several factors. Firstly, the attack requires specific prerequisites, including knowledge of the target SSID and the misconfiguration of wpa_supplicant on the victim's device, which somewhat limits its widespread exploitation. Additionally, the attack vector primarily targets Enterprise networks relying on PEAP authentication, narrowing its impact compared to more widely used authentication methods. Furthermore, while the ability to bypass Phase-2 authentication poses a risk of unauthorized network access and potential data exposure, it does not directly compromise the confidentiality or integrity of sensitive information.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6wpa_supplicantOut of support scope
Red Hat Enterprise Linux 7wpa_supplicantOut of support scope
Red Hat Enterprise Linux 8wpa_supplicantWill not fix
Red Hat Enterprise Linux 9wpa_supplicantFixedRHSA-2024:251730.04.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=2264593wpa_supplicant: potential authorization bypass

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.

CVSS3: 6.5
nvd
больше 1 года назад

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.

CVSS3: 6.5
msrc
4 месяца назад

Описание отсутствует

CVSS3: 6.5
debian
больше 1 года назад

The implementation of PEAP in wpa_supplicant through 2.10 allows authe ...

suse-cvrf
9 месяцев назад

Security update for wpa_supplicant

6.5 Medium

CVSS3