CVE-2023-52160

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52160
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52160.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52160
Related
Published
2024-02-22T17:15:08Z
Modified
2024-05-22T17:27:22.443861Z
Severity
  • CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Summary
[none]
Details

The implementation of PEAP in wpasupplicant through 2.10 allows authentication bypass. For a successful attack, wpasupplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eappeapdecrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.

References

Affected packages

Alpine:v3.19 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
pkg:apk/alpine/wpa_supplicant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10-r10

Affected versions

0.*

0.5.11-r0
0.6.9-r0
0.6.9-r1
0.6.10-r0
0.7.1-r0
0.7.1-r1
0.7.1-r2
0.7.2-r0
0.7.2-r1
0.7.2-r2
0.7.3-r0
0.7.3-r1
0.7.3-r2

1.*

1.0-r0
1.0-r1
1.0-r2
1.1-r0
1.1-r1

2.*

2.0-r0
2.0-r1
2.0-r2
2.0-r3
2.1-r0
2.1-r1
2.1-r2
2.2-r0
2.3-r0
2.3-r1
2.4-r0
2.4-r1
2.4-r2
2.4-r3
2.4-r4
2.4-r5
2.4-r6
2.4-r7
2.4-r8
2.5-r0
2.5-r1
2.5-r2
2.5-r3
2.6-r0
2.6-r1
2.6-r2
2.6-r3
2.6-r4
2.6-r5
2.6-r6
2.6-r7
2.6-r8
2.6-r9
2.6-r10
2.6-r11
2.6-r12
2.6-r13
2.6-r14
2.6-r15
2.7-r0
2.7-r1
2.7-r2
2.7-r3
2.8-r0
2.8-r1
2.9-r0
2.9-r1
2.9-r2
2.9-r3
2.9-r4
2.9-r5
2.9-r6
2.9-r7
2.9-r8
2.9-r9
2.9-r10
2.9-r11
2.9-r12
2.9-r13
2.9-r14
2.9-r15
2.9-r16
2.9-r17

Alpine:v3.20 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
pkg:apk/alpine/wpa_supplicant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10-r11

Affected versions

0.*

0.5.11-r0
0.6.9-r0
0.6.9-r1
0.6.10-r0
0.7.1-r0
0.7.1-r1
0.7.1-r2
0.7.2-r0
0.7.2-r1
0.7.2-r2
0.7.3-r0
0.7.3-r1
0.7.3-r2

1.*

1.0-r0
1.0-r1
1.0-r2
1.1-r0
1.1-r1

2.*

2.0-r0
2.0-r1
2.0-r2
2.0-r3
2.1-r0
2.1-r1
2.1-r2
2.2-r0
2.3-r0
2.3-r1
2.4-r0
2.4-r1
2.4-r2
2.4-r3
2.4-r4
2.4-r5
2.4-r6
2.4-r7
2.4-r8
2.5-r0
2.5-r1
2.5-r2
2.5-r3
2.6-r0
2.6-r1
2.6-r2
2.6-r3
2.6-r4
2.6-r5
2.6-r6
2.6-r7
2.6-r8
2.6-r9
2.6-r10
2.6-r11
2.6-r12
2.6-r13
2.6-r14
2.6-r15
2.7-r0
2.7-r1
2.7-r2
2.7-r3
2.8-r0
2.8-r1
2.9-r0
2.9-r1
2.9-r2
2.9-r3
2.9-r4
2.9-r5
2.9-r6
2.9-r7
2.9-r8
2.9-r9
2.9-r10
2.9-r11
2.9-r12
2.9-r13
2.9-r14
2.9-r15
2.9-r16
2.9-r17