跳转到帖子

Oracle Linux: CVE-2023-52160: ELSA-2024-2517: wpa_supplicant security update (MODERATE) (Multiple Advisories)

recommended_posts

发布于
  • 超级管理员

Oracle Linux: CVE-2023-52160: ELSA-2024-2517:wpa_supplicant security update (MODERATE) (Multiple Advisories)

Severity
6
CVSS
(AV:A/AC:L/Au:N/C:C/I:N/A:N)
Published
02/16/2024
Created
05/22/2024
Added
05/09/2024
Modified
01/07/2025

Description

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks. A flaw was found in wpa_supplicant's implementation of PEAP. This issue may allow an attacker to skip the second phase of authentication when the target device has not been properly configured to verify the authentication server. By skipping the second phase of authentication, it’s easier for an attacker to create a rogue clone of a trusted WiFi network to trick the victim into connecting, all without knowing their password.

Solution(s)

  • oracle-linux-upgrade-wpa-supplicant

References

  • https://attackerkb.com/topics/cve-2023-52160
  • CVE - 2023-52160
  • ELSA-2024-2517
  • 查看数 708
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…