Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:0818-1

Опубликовано: 08 мар. 2024
Источник: suse-cvrf

Описание

Security update for wpa_supplicant

This update for wpa_supplicant fixes the following issues:

  • CVE-2023-52160: Bypassing WiFi Authentication (bsc#1219975).

Список пакетов

SUSE Linux Enterprise Server 12 SP5
wpa_supplicant-2.9-23.20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
wpa_supplicant-2.9-23.20.1

Описание

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:wpa_supplicant-2.9-23.20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5:wpa_supplicant-2.9-23.20.1

Ссылки