7.5
CVSSv3

CVE-2023-52161

Published: 22/02/2024 Updated: 23/03/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) prior to 2.14 allows malicious users to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel inet wireless daemon

Vendor Advisories

Debian Bug report logs - #1064062 iwd: CVE-2023-52161 Package: src:iwd; Maintainer for src:iwd is Jonas Smedegaard <dr@jonesdk>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 16 Feb 2024 15:18:02 UTC Severity: grave Tags: security, upstream Reply or subscribe to this bug Toggle useless messagesV ...