Lucene search

K
redhatcveRedhat.comRH:CVE-2023-52160
HistoryFeb 16, 2024 - 7:52 p.m.

CVE-2023-52160

2024-02-1619:52:27
redhat.com
access.redhat.com
59
wpa_supplicant
peap
authentication
server
skipping
wifi
network
rogue
clone
red hat
product security
mitigation

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

AI Score

9.2

Confidence

High

EPSS

0.001

Percentile

35.7%

A flaw was found in wpa_supplicant’s implementation of PEAP. This issue may allow an attacker to skip the second phase of authentication when the target device has not been properly configured to verify the authentication server. By skipping the second phase of authentication, it’s easier for an attacker to create a rogue clone of a trusted WiFi network to trick the victim into connecting, all without knowing their password.

Mitigation

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

AI Score

9.2

Confidence

High

EPSS

0.001

Percentile

35.7%