Missing Critical Step in Authentication Affecting iwl100-firmware package, versions *


Severity

Recommended
medium

Based on CentOS security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS7-IWL100FIRMWARE-7297468
  • published20 Jun 2024
  • disclosed17 May 2024

Introduced: 17 May 2024

CVE-2023-52424  (opens in a new tab)
CWE-304  (opens in a new tab)

How to fix?

There is no fixed version for Centos:7 iwl100-firmware.

NVD Description

Note: Versions mentioned in the description apply only to the upstream iwl100-firmware package and not the iwl100-firmware package as distributed by Centos. See How to fix? for Centos:7 relevant fixed versions and status.

The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an "SSID Confusion" issue. This occurs because the SSID is not always used to derive the pairwise master key or session keys, and because there is not a protected exchange of an SSID during a 4-way handshake.

CVSS Scores

version 3.1