W1.fi WPA Supplicant 2.10

CPE Details

W1.fi WPA Supplicant 2.10
2.10
2021-03-02
11h44 +00:00
2021-08-17
15h10 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:w1.fi:wpa_supplicant:2.10:*:*:*:*:*:*:*

Informations

Vendor

w1.fi

Product

wpa_supplicant

Version

2.10

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-52160 2024-02-21 23h00 +00:00 The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
6.5
Medium