Advisories ยป MGASA-2024-0053

Updated wpa_supplicant packages fix security vulnerabilities

Publication date: 06 Mar 2024
Modification date: 06 Mar 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-52160

Description

The updated packages fix a security vulnerability:
The implementation of PEAP in wpa_supplicant through 2.10 allows
authentication bypass. For a successful attack, wpa_supplicant must be
configured to not verify the network's TLS certificate during Phase 1
authentication, and an eap_peap_decrypt vulnerability can then be abused
to skip Phase 2 authentication. The attack vector is sending an EAP-TLV
Success packet instead of starting Phase 2. This allows an adversary to
impersonate Enterprise Wi-Fi networks.
(CVE-2023-52160)
                

References

SRPMS

9/core