Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2023-52161
HistoryFeb 22, 2024 - 5:15 p.m.

CVE-2023-52161

2024-02-2217:15:08
Alpine Linux Development Team
security.alpinelinux.org
45
cve-2023-52161
access point functionality
eapol_auth_key_handle
eapol.c
inet wireless daemon
unauthorized access
protected wi-fi network
eapol handshake
msg2/4
msg4/4
all-zero key
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

OSVersionArchitecturePackageVersionFilename
Alpineedge-communitynoarchiwd< 2.14-r0UNKNOWN
Alpine3.20-communitynoarchiwd< 2.14-r0UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%