MGASA-2024-0053 - Updated wpa_supplicant packages fix security vulnerabilities

Publication date: 06 Mar 2024
URL: https://advisories.mageia.org/MGASA-2024-0053.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2023-52160

The updated packages fix a security vulnerability:
The implementation of PEAP in wpa_supplicant through 2.10 allows
authentication bypass. For a successful attack, wpa_supplicant must be
configured to not verify the network's TLS certificate during Phase 1
authentication, and an eap_peap_decrypt vulnerability can then be abused
to skip Phase 2 authentication. The attack vector is sending an EAP-TLV
Success packet instead of starting Phase 2. This allows an adversary to
impersonate Enterprise Wi-Fi networks.
(CVE-2023-52160)

References:
- https://bugs.mageia.org/show_bug.cgi?id=32911
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/
- https://lists.debian.org/debian-lts-announce/2024/02/msg00013.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.383534
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52160

SRPMS:
- 9/core/wpa_supplicant-2.10-3.1.mga9

Mageia 2024-0053: wpa_supplicant security update

The updated packages fix a security vulnerability: The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass

Summary

The updated packages fix a security vulnerability: The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks. (CVE-2023-52160)

References

- https://bugs.mageia.org/show_bug.cgi?id=32911

- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N46C4DTVUWK336OYDA4LGALSC5VVPTCC/

- https://lists.debian.org/debian-lts-announce/2024/02/msg00013.html

- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.383534

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52160

Resolution

MGASA-2024-0053 - Updated wpa_supplicant packages fix security vulnerabilities

SRPMS

- 9/core/wpa_supplicant-2.10-3.1.mga9

Severity
Publication date: 06 Mar 2024
URL: https://advisories.mageia.org/MGASA-2024-0053.html
Type: security
CVE: CVE-2023-52160

Related News