Article Details
Scrape Timestamp (UTC): 2024-02-21 16:20:06.352
Source: https://thehackernews.com/2024/02/new-wi-fi-vulnerabilities-expose.html
Original Article Text
Click to Toggle View
New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers. Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in Android, Linux, and ChromeOS devices that could trick users into joining a malicious clone of a legitimate network or allow an attacker to join a trusted network without a password. The vulnerabilities, tracked as CVE-2023-52160 and CVE-2023-52161, have been discovered following a security evaluation of wpa_supplicant and Intel's iNet Wireless Daemon (IWD), respectively. The flaws "allow attackers to trick victims into connecting to malicious clones of trusted networks and intercept their traffic, and join otherwise secure networks without needing the password," Top10VPN said in a new research conducted in collaboration with Mathy Vanhoef, who has previously uncovered Wi-Fi attacks like KRACK, DragonBlood, and TunnelCrack. CVE-2023-52161, in particular, permits an adversary to gain unauthorized access to a protected Wi-Fi network, exposing existing users and devices to potential attacks such as malware infections, data theft, and business email compromise (BEC). It impacts IWD versions 2.12 and lower. On the other hand, CVE-2023-52160 affects wpa_supplicant versions 2.10 and prior. It's also the more pressing of the two flaws owing to the fact that it's the default software used in Android devices to handle login requests to wireless networks. That said, it only impacts Wi-Fi clients that aren't properly configured to verify the certificate of the authentication server. CVE-2023-52161, however, affects any network that uses a Linux device as a wireless access point (WAP). Successful exploitation of CVE-2023-52160 banks on the prerequisite that the attacker is in possession of the SSID of a Wi-Fi network to which the victim has previously connected. It also requires the threat actor to be in physical proximity to the victim. "One possible such scenario might be where an attacker walks around a company's building scanning for networks before targeting an employee leaving the office," the researchers said. Major Linux distributions such as Debian (1, 2), Red Hat (1), SUSE (1, 2), and Ubuntu (1, 2) have released advisories for the two flaws. The wpa_supplicant issue has also been addressed in ChromeOS from versions 118 and later, but fixes for Android are yet to be made available. "In the meantime, it's critical, therefore, that Android users manually configure the CA certificate of any saved enterprise networks to prevent the attack," Top10VPN said. ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.
Daily Brief Summary
Two significant authentication bypass vulnerabilities were identified in Wi-Fi software affecting Android, Linux, and ChromeOS devices.
The flaws, CVE-2023-52160 and CVE-2023-52161, allow attackers to lure users into connecting to malicious Wi-Fi networks and to join secure networks without a password.
CVE-2023-52161 enables unauthorized access to Wi-Fi networks, potentially leading to malware infections, data theft, and business email compromise.
The more critical CVE-2023-52160 affects devices that don't properly verify the authentication server's certificate, primarily impacting Android users.
An attacker must have the network SSID and be near the victim to exploit CVE-2023-52160, posing risks particularly around business environments.
Major Linux distributions have released advisories, and ChromeOS has a fix from version 118 onwards; however, Android fixes are still pending.
Android users are urged to manually configure CA certificates for enterprise networks to mitigate the risk until an official fix is deployed.