Bug 2282013 (CVE-2023-52424)
| Summary: | CVE-2023-52424 802.11: SSID Confusion attack | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | darunesh, dfreiber, drow, dvlasenk, jburrell, pbrobinson, security-response-team, sidakwo, vkumar |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | Flags: | pbrobinson:
needinfo?
(darunesh) |
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
A flaw was found in the IEEE 802.11 standard. This vulnerability possibly allows an adversary to trick a victim into connecting to an unintended or untrusted network because the SSID is not always used to derive the pairwise master key or session keys and because there is not a protected exchange of an SSID during a 4-way handshake.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2293096, 2293094, 2293095, 2293097, 2293098, 2294016 | ||
| Bug Blocks: | 2282014 | ||
|
Description
Pedro Sampaio
2024-05-20 20:17:56 UTC
public at following link, remove embargo: https://www.top10vpn.com/research/wifi-vulnerability-ssid/ Created NetworkManager tracking bugs for this issue: Affects: fedora-all [bug 2293094] Created hostapd tracking bugs for this issue: Affects: epel-all [bug 2293096] Affects: fedora-all [bug 2293097] Created linux-firmware tracking bugs for this issue: Affects: fedora-all [bug 2293098] Created wpa_supplicant tracking bugs for this issue: Affects: fedora-all [bug 2293095] (In reply to Anten Skrabec from comment #2) > public at following link, remove embargo: > https://www.top10vpn.com/research/wifi-vulnerability-ssid/ Looking at this I would expect this to cover the linux kernel plus userspace. What wireless firmware are affected by this? Also suspect you've missed iwd (similar to wpa_supplicant). Created iwd tracking bugs for this issue: Affects: fedora-all [bug 2294016] > Created linux-firmware tracking bugs
After reading the documentation on the CVE, the fix is likely to not be in wifi *firmware*, but in software (prefer / force WPA3 SAE-const mode instead of SAE-loop): IIRC these days authentication protocols are not delegated to firmware, as they evolve too quickly, and may need some CPU power to do elliptic curve math and such, thus host CPU is much more suitable location to handle it.
|