Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-52424

Опубликовано: 17 мая 2024
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an "SSID Confusion" issue. This occurs because the SSID is not always used to derive the pairwise master key or session keys, and because there is not a protected exchange of an SSID during a 4-way handshake.

A flaw was found in the IEEE 802.11 standard. This vulnerability possibly allows an adversary to trick a victim into connecting to an unintended or untrusted network because the SSID is not always used to derive the pairwise master key or session keys and because there is not a protected exchange of an SSID during a 4-way handshake.

Отчет

This vulnerability affects networks using the WEP, WPA3 SAE-loop, 802.1x/EAP, FILS, and Mesh AMPE authentication protocols, arising from a design flaw in the WiFi standard IEEE 802.11 allows attackers to trick victims into connecting to less secure networks and intercept their traffic. This significantly impacts Confidentiality, as sensitive data can be intercepted. Integrity is compromised because attackers can alter intercepted data. Availability is also affected, as the attack exploits the auto-disconnect feature in certain VPN clients, causing the VPN to disable when the device connects to a predefined “trusted” WiFi network, leaving the user unprotected. The impact is Moderate, because of the attack limitations: credentials of the valid WiFi network and malicious one suppose to be the same.

Меры по смягчению последствий

Avoid Credential Reuse: One of the key recommendations is to avoid reusing credentials across different SSIDs. Each network should have unique credentials to prevent attackers from easily setting up rogue networks with matching authentication details.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10hostapdNot affected
Red Hat Enterprise Linux 10linux-firmwareNot affected
Red Hat Enterprise Linux 10NetworkManagerNot affected
Red Hat Enterprise Linux 10wpa_supplicantNot affected
Red Hat Enterprise Linux 6NetworkManagerOut of support scope
Red Hat Enterprise Linux 6wpa_supplicantOut of support scope
Red Hat Enterprise Linux 7linux-firmwareWill not fix
Red Hat Enterprise Linux 7NetworkManagerNot affected
Red Hat Enterprise Linux 7wpa_supplicantWill not fix
Red Hat Enterprise Linux 8hostapdWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-304

EPSS

Процентиль: 44%
0.00214
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 1 года назад

The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an "SSID Confusion" issue. This occurs because the SSID is not always used to derive the pairwise master key or session keys, and because there is not a protected exchange of an SSID during a 4-way handshake.

CVSS3: 7.4
nvd
больше 1 года назад

The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an "SSID Confusion" issue. This occurs because the SSID is not always used to derive the pairwise master key or session keys, and because there is not a protected exchange of an SSID during a 4-way handshake.

CVSS3: 7.4
github
больше 1 года назад

The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an "SSID Confusion" issue. This occurs because the SSID is not always used to derive the pairwise master key or session keys, and because there is not a protected exchange of an SSID during a 4-way handshake.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость реализации стандарта Wi-Fi IEEE 802.11, связанная с недостаточной защитой служебных данных при обработке SSID-идентификатора, позволяющая нарушителю выполнить перехват трафика путём подмены точки доступа

EPSS

Процентиль: 44%
0.00214
Низкий

7.4 High

CVSS3