CVE-2023-52160 | Date: (C)2024-02-24 (M)2024-04-26 |
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : 6.5 | CVSS Score : |
Exploit Score: 2.8 | Exploit Score: |
Impact Score: 3.6 | Impact Score: |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: NETWORK | Access Vector: |
Attack Complexity: LOW | Access Complexity: |
Privileges Required: NONE | Authentication: |
User Interaction: REQUIRED | Confidentiality: |
Scope: UNCHANGED | Integrity: |
Confidentiality: HIGH | Availability: |
Integrity: NONE | |
Availability: NONE | |
| |