The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2024-02-22 17:15
Updated : 2024-11-21 08:39
NVD link : CVE-2023-52160
Mitre link : CVE-2023-52160
CVE.ORG link : CVE-2023-52160
JSON object : View
Products Affected
w1.fi
- wpa_supplicant
debian
- debian_linux
fedoraproject
- fedora
- chrome_os
- android
redhat
- enterprise_linux
linux
- linux_kernel
CWE
CWE-287
Improper Authentication