Rapid7 Vulnerability & Exploit Database

Oracle Linux: CVE-2023-52160: ELSA-2024-2517: wpa_supplicant security update (MODERATE) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: CVE-2023-52160: ELSA-2024-2517: wpa_supplicant security update (MODERATE) (Multiple Advisories)

Severity
6
CVSS
(AV:A/AC:L/Au:N/C:C/I:N/A:N)
Published
02/16/2024
Created
05/22/2024
Added
05/09/2024
Modified
07/22/2024

Description

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks. A flaw was found in wpa_supplicant's implementation of PEAP. This issue may allow an attacker to skip the second phase of authentication when the target device has not been properly configured to verify the authentication server. By skipping the second phase of authentication, it’s easier for an attacker to create a rogue clone of a trusted WiFi network to trick the victim into connecting, all without knowing their password.

Solution(s)

  • oracle-linux-upgrade-dotnet-sdk-7-0-source-built-artifacts
  • oracle-linux-upgrade-wpa-supplicant

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;