Missing Critical Step in Authentication Affecting iwl100-firmware package, versions *
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-IWL100FIRMWARE-7292478
- published 20 Jun 2024
- disclosed 17 May 2024
Introduced: 17 May 2024
CVE-2023-52424 Open this link in a new tabHow to fix?
There is no fixed version for Centos:8 iwl100-firmware.
NVD Description
Note: Versions mentioned in the description apply only to the upstream iwl100-firmware package and not the iwl100-firmware package as distributed by Centos.
See How to fix? for Centos:8 relevant fixed versions and status.
The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an "SSID Confusion" issue. This occurs because the SSID is not always used to derive the pairwise master key or session keys, and because there is not a protected exchange of an SSID during a 4-way handshake.
References
- https://access.redhat.com/security/cve/CVE-2023-52424
- https://mentor.ieee.org/802.11/dcn/24/11-24-0938-03-000m-protect-ssid-in-4-way-handshake.docx
- https://www.top10vpn.com/assets/2024/05/Top10VPN-x-Vanhoef-SSID-Confusion.pdf
- https://www.top10vpn.com/research/wifi-vulnerability-ssid/
- https://www.wi-fi.org/news-events/press-releases