The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2024-02-22 17:15
Updated : 2024-03-10 04:15
NVD link : CVE-2023-52160
Mitre link : CVE-2023-52160
CVE.ORG link : CVE-2023-52160
JSON object : View
Products Affected
- chrome_os
- android
fedoraproject
- fedora
linux
- linux_kernel
redhat
- enterprise_linux
debian
- debian_linux
w1.fi
- wpa_supplicant
CWE
CWE-287
Improper Authentication