Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-52161

Опубликовано: 22 фев. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

2.14-1ubuntu3
esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

mantic

ignored

end of life, was needs-triage
noble

needs-triage

oracular

not-affected

2.14-1ubuntu3

Показывать по

EPSS

Процентиль: 31%
0.00112
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

CVSS3: 7.5
debian
больше 1 года назад

The Access Point functionality in eapol_auth_key_handle in eapol.c in ...

CVSS3: 7.5
github
больше 1 года назад

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость функции eapol_auth_key_handle демона iNet Wireless, позволяющая нарушителю подключиться к защищённой Wi-Fi-сети

EPSS

Процентиль: 31%
0.00112
Низкий

7.5 High

CVSS3