CVE-2023-52160
CVSS 3.1 Score 6.5 of 10 (medium)
Details
Summary
CVE-2023-52160 is a vulnerability that affects the implementation of PEAP in wpa_supplicant up to version 2.10. This vulnerability allows for authentication bypass, enabling an attacker to impersonate Enterprise Wi-Fi networks. To exploit this vulnerability, the attacker must configure wpa_supplicant to not verify the network's TLS certificate during Phase 1 authentication and then abuse an eap_peap_decrypt vulnerability to skip Phase 2 authentication by sending an EAP-TLV Success packet. The potential danger of this vulnerability is high confidentiality impact, as an attacker could gain unauthorized access to sensitive information on the organization's network. Remediation involves updating wpa_supplicant to version 2.11 or later and configuring it to properly verify the network's TLS certificate during authentication processes.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions