Описание
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | deferred | |
esm-infra-legacy/trusty | deferred | |
esm-infra/bionic | deferred | |
esm-infra/focal | deferred | |
esm-infra/xenial | deferred | |
focal | ignored | end of standard support, was deferred |
jammy | deferred | |
mantic | ignored | end of life, was deferred |
noble | deferred |
Показывать по
6.5 Medium
CVSS3
Связанные уязвимости
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
The implementation of PEAP in wpa_supplicant through 2.10 allows authe ...
6.5 Medium
CVSS3