Total vulnerabilities in the database
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
Software | From | Fixed in |
---|---|---|
debian / debian_linux | 10.0 | 10.0.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
redhat / enterprise_linux | 9.0 | 9.0.x |
fedoraproject / fedora | 39 | 39.x |
fedoraproject / fedora | 38 | 38.x |
w1.fi / wpa_supplicant | - | 2.10.x |