Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-52161: n/a

0
High
VulnerabilityCVE-2023-52161cvecve-2023-52161
Published: Thu Feb 22 2024 (02/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

AI-Powered Analysis

AILast updated: 11/11/2025, 21:03:55 UTC

Technical Analysis

CVE-2023-52161 is a vulnerability identified in the iNet wireless daemon (IWD), a Linux-based wireless management daemon used to handle Wi-Fi connections, particularly in embedded and Linux environments. The flaw resides in the Access Point functionality within the EAPOL (Extensible Authentication Protocol over LAN) handshake implementation, specifically in the function eapol_auth_key_handle in eapol.c. Normally, the EAPOL handshake involves a four-message exchange to securely authenticate clients to a protected Wi-Fi network. This vulnerability allows an attacker to bypass part of this handshake by skipping message 2 of 4 and sending message 4 of 4 with an all-zero key. This manipulation tricks the Access Point into completing the handshake and granting network access without proper authentication. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The CVSS 3.1 score of 7.5 reflects its high impact on confidentiality, as unauthorized users can gain access to protected networks, though it does not affect integrity or availability directly. No patches were linked in the provided data, but the vulnerability is fixed in IWD version 2.14 and later. There are no known exploits in the wild at this time, but the ease of exploitation and potential impact make it a critical issue for organizations relying on IWD for wireless access point management.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized access to protected Wi-Fi networks managed by IWD. Such unauthorized access can lead to data interception, lateral movement within internal networks, and potential exposure of sensitive information. Organizations in sectors with high security requirements, such as finance, healthcare, and government, could face confidentiality breaches. The vulnerability's network-based exploitability means attackers do not need physical access or credentials, increasing the attack surface. Additionally, compromised Wi-Fi networks can be used as entry points for further attacks, including malware deployment or espionage. The lack of impact on integrity and availability reduces the risk of service disruption but does not mitigate the confidentiality threat. European entities using Linux-based wireless infrastructure, especially those deploying IWD as an access point daemon, are particularly vulnerable. The absence of known exploits in the wild provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Upgrade all instances of iNet wireless daemon (IWD) to version 2.14 or later, where the vulnerability is patched. 2. If immediate upgrading is not feasible, implement network segmentation to isolate wireless access points from sensitive internal networks, limiting potential lateral movement. 3. Monitor wireless network logs for unusual EAPOL handshake patterns, such as skipped messages or anomalous key exchanges, which may indicate exploitation attempts. 4. Employ network intrusion detection systems (NIDS) with signatures or heuristics capable of detecting abnormal EAPOL traffic. 5. Restrict physical and network access to wireless access points to trusted personnel and devices. 6. Conduct regular security audits of wireless infrastructure configurations and firmware versions. 7. Educate network administrators about this specific vulnerability and encourage vigilance for suspicious wireless authentication behavior. 8. Consider deploying additional authentication layers or network access control (NAC) solutions to mitigate risks from compromised Wi-Fi authentication.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-29T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47456d939959c802225b

Added to database: 11/4/2025, 6:34:45 PM

Last enriched: 11/11/2025, 9:03:55 PM

Last updated: 12/17/2025, 5:05:56 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats