Lucene search

K
redhatcveRedhat.comRH:CVE-2023-52160
HistoryFeb 16, 2024 - 7:52 p.m.

CVE-2023-52160

2024-02-1619:52:27
redhat.com
access.redhat.com
54
wpa_supplicant
peap
authentication
server
skipping
wifi
network
rogue
clone
red hat
product security
mitigation

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.9%

A flaw was found in wpa_supplicant’s implementation of PEAP. This issue may allow an attacker to skip the second phase of authentication when the target device has not been properly configured to verify the authentication server. By skipping the second phase of authentication, it’s easier for an attacker to create a rogue clone of a trusted WiFi network to trick the victim into connecting, all without knowing their password.

Mitigation

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.9%