Wind River Support Network

HomeDefectsLIN1021-7264
Fixed

LIN1021-7264 : Security Advisory - wpa-supplicant - CVE-2023-52160

Created: Feb 18, 2024    Updated: Nov 24, 2024
Resolved Date: Nov 20, 2024
Found In Version: 10.21.20.1
Fix Version: 10.21.20.24
Severity: Standard
Applicable for: Wind River Linux LTS 21
Component/s: Userspace

Description

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.

[https://nvd.nist.gov/vuln/detail/CVE-2023-52160]
Live chat
Online