Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-52161
HistoryFeb 22, 2024 - 5:15 p.m.

CVE-2023-52161

2024-02-2217:15:08
Debian Security Bug Tracker
security-tracker.debian.org
52
cve-2023-52161
access point functionality
eapol_auth_key_handle
eapol handshake
msg4/4
all-zero key
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%