New WiFi Authentication Vulnerabilities For Linux's IWD & WPA_Supplicant

Written by Michael Larabel in Linux Security on 13 February 2024 at 09:16 AM EST. 14 Comments
LINUX SECURITY
Kicking off what may end up being a fairly busy Patch Tuesday are two WiFi authentication vulnerabilities being made public that affect Intel's IWD daemon as well as the WPA_Supplicant software -- between the two they are the most common solutions for wireless daemons on Linux systems.

CVE-2023-52160 is now public as the WPA_Supplicant vulnerability that can allow an attacker to trick a victim into connecting to a malicious clone of an enterprise WiFi network and in turn intercepting all traffic. This affects both Android, Chrome OS, and Linux systems relying on WPA_Supplicant.

WiFi adapter


CVE-2023-52161 is the Intel IWD daemon vulnerability and it can allow an attacker to gain unauthorized access to a protected home WiFi network.

More details on these new IWD and WPA_Supplicant vulnerabilities can be found via the blog post on top10vpn.com with more details by the security researchers involved with finding these Linux WiFi authentication vulnerabilities.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week