CVE-2023-52160

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52160
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52160.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52160
Related
Published
2024-02-22T17:15:08Z
Modified
2024-10-23T20:46:54.938446Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The implementation of PEAP in wpasupplicant through 2.10 allows authentication bypass. For a successful attack, wpasupplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eappeapdecrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.

References

Affected packages

Alpine:v3.19 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
pkg:apk/alpine/wpa_supplicant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10-r10

Affected versions

0.*

0.5.11-r0
0.6.9-r0
0.6.9-r1
0.6.10-r0
0.7.1-r0
0.7.1-r1
0.7.1-r2
0.7.2-r0
0.7.2-r1
0.7.2-r2
0.7.3-r0
0.7.3-r1
0.7.3-r2

1.*

1.0-r0
1.0-r1
1.0-r2
1.1-r0
1.1-r1

2.*

2.0-r0
2.0-r1
2.0-r2
2.0-r3
2.1-r0
2.1-r1
2.1-r2
2.2-r0
2.3-r0
2.3-r1
2.4-r0
2.4-r1
2.4-r2
2.4-r3
2.4-r4
2.4-r5
2.4-r6
2.4-r7
2.4-r8
2.5-r0
2.5-r1
2.5-r2
2.5-r3
2.6-r0
2.6-r1
2.6-r2
2.6-r3
2.6-r4
2.6-r5
2.6-r6
2.6-r7
2.6-r8
2.6-r9
2.6-r10
2.6-r11
2.6-r12
2.6-r13
2.6-r14
2.6-r15
2.7-r0
2.7-r1
2.7-r2
2.7-r3
2.8-r0
2.8-r1
2.9-r0
2.9-r1
2.9-r2
2.9-r3
2.9-r4
2.9-r5
2.9-r6
2.9-r7
2.9-r8
2.9-r9
2.9-r10
2.9-r11
2.9-r12
2.9-r13
2.9-r14
2.9-r15
2.9-r16
2.9-r17
2.10-r0
2.10-r1
2.10-r2
2.10-r3
2.10-r4
2.10-r5
2.10-r6
2.10-r7
2.10-r8
2.10-r9

Alpine:v3.20 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
pkg:apk/alpine/wpa_supplicant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10-r11

Affected versions

0.*

0.5.11-r0
0.6.9-r0
0.6.9-r1
0.6.10-r0
0.7.1-r0
0.7.1-r1
0.7.1-r2
0.7.2-r0
0.7.2-r1
0.7.2-r2
0.7.3-r0
0.7.3-r1
0.7.3-r2

1.*

1.0-r0
1.0-r1
1.0-r2
1.1-r0
1.1-r1

2.*

2.0-r0
2.0-r1
2.0-r2
2.0-r3
2.1-r0
2.1-r1
2.1-r2
2.2-r0
2.3-r0
2.3-r1
2.4-r0
2.4-r1
2.4-r2
2.4-r3
2.4-r4
2.4-r5
2.4-r6
2.4-r7
2.4-r8
2.5-r0
2.5-r1
2.5-r2
2.5-r3
2.6-r0
2.6-r1
2.6-r2
2.6-r3
2.6-r4
2.6-r5
2.6-r6
2.6-r7
2.6-r8
2.6-r9
2.6-r10
2.6-r11
2.6-r12
2.6-r13
2.6-r14
2.6-r15
2.7-r0
2.7-r1
2.7-r2
2.7-r3
2.8-r0
2.8-r1
2.9-r0
2.9-r1
2.9-r2
2.9-r3
2.9-r4
2.9-r5
2.9-r6
2.9-r7
2.9-r8
2.9-r9
2.9-r10
2.9-r11
2.9-r12
2.9-r13
2.9-r14
2.9-r15
2.9-r16
2.9-r17
2.10-r0
2.10-r1
2.10-r2
2.10-r3
2.10-r4
2.10-r5
2.10-r6
2.10-r7
2.10-r8
2.10-r9
2.10-r10

Debian:11 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.9.0-21+deb11u1

Affected versions

2:2.*

2:2.9.0-21

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.10-12+deb12u1

Affected versions

2:2.*

2:2.10-12

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.10-21.1

Affected versions

2:2.*

2:2.10-12
2:2.10-13
2:2.10-14
2:2.10-15
2:2.10-16
2:2.10-17
2:2.10-18
2:2.10-20
2:2.10-21

Ecosystem specific

{
    "urgency": "not yet assigned"
}