CVE-2023-52161

NameCVE-2023-52161
DescriptionThe Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3738-1, DSA-5631-1
Debian Bugs1064062

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
iwd (PTS)buster0.14-2vulnerable
buster (security)0.14-2+deb10u1fixed
bullseye1.14-3vulnerable
bullseye (security)1.14-3+deb11u1fixed
bookworm2.3-1vulnerable
bookworm (security)2.3-1+deb12u1fixed
trixie2.15-1fixed
sid2.17-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
iwdsourcebuster0.14-2+deb10u1DLA-3738-1
iwdsourcebullseye1.14-3+deb11u1DSA-5631-1
iwdsourcebookworm2.3-1+deb12u1DSA-5631-1
iwdsource(unstable)2.14-11064062

Notes

https://www.top10vpn.com/research/wifi-vulnerabilities/
https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=6415420f1c92012f64063c131480ffcef58e60ca (2.14)

Search for package or bug name: Reporting problems