Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52161
HistoryFeb 22, 2024 - 12:00 a.m.

CVE-2023-52161

2024-02-2200:00:00
ubuntu.com
ubuntu.com
17
eapol_auth_key_handle
unauthorized access
protected wi-fi network
eapol handshake
all-zero key
inet wireless daemon
debian
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet
wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized
access to a protected Wi-Fi network. An attacker can complete the EAPOL
handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero
key.

Bugs

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%