Wind River Support Network

HomeDefectsLIN1019-10965
Fixed

LIN1019-10965 : Security Advisory - wpa-supplicant - CVE-2023-52160

Created: Feb 18, 2024    Updated: Dec 11, 2024
Resolved Date: Dec 2, 2024
Found In Version: 10.19.45.1
Fix Version: 10.19.45.32
Severity: Standard
Applicable for: Wind River Linux LTS 19
Component/s: Userspace

Description

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.

[https://nvd.nist.gov/vuln/detail/CVE-2023-52160]
Live chat
Online