28 lines
977 B
JSON
Raw Normal View History

{
"id": "CVE-2023-52161",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T17:15:08.327",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=6415420f1c92012f64063c131480ffcef58e60ca",
"source": "cve@mitre.org"
},
{
"url": "https://iwd.wiki.kernel.org/",
"source": "cve@mitre.org"
},
{
"url": "https://www.top10vpn.com/research/wifi-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}