CVE-2023-52161

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intel:inet_wireless_daemon:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-02-22 17:15

Updated : 2024-03-23 03:15


NVD link : CVE-2023-52161

Mitre link : CVE-2023-52161

CVE.ORG link : CVE-2023-52161


JSON object : View

Products Affected

intel

  • inet_wireless_daemon
CWE
CWE-287

Improper Authentication