{"id":"ALPINE-CVE-2023-52160","details":"The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.","modified":"2026-03-09T01:23:36.508501Z","published":"2024-02-22T17:15:08.263Z","upstream":["CVE-2023-52160"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2023-52160"}],"affected":[{"package":{"name":"wpa_supplicant","ecosystem":"Alpine:v3.19","purl":"pkg:apk/alpine/wpa_supplicant?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.10-r10"}]}],"versions":["0.5.11-r0","0.6.10-r0","0.6.9-r0","0.6.9-r1","0.7.1-r0","0.7.1-r1","0.7.1-r2","0.7.2-r0","0.7.2-r1","0.7.2-r2","0.7.3-r0","0.7.3-r1","0.7.3-r2","1.0-r0","1.0-r1","1.0-r2","1.1-r0","1.1-r1","2.0-r0","2.0-r1","2.0-r2","2.0-r3","2.1-r0","2.1-r1","2.1-r2","2.10-r0","2.10-r1","2.10-r2","2.10-r3","2.10-r4","2.10-r5","2.10-r6","2.10-r7","2.10-r8","2.10-r9","2.2-r0","2.3-r0","2.3-r1","2.4-r0","2.4-r1","2.4-r2","2.4-r3","2.4-r4","2.4-r5","2.4-r6","2.4-r7","2.4-r8","2.5-r0","2.5-r1","2.5-r2","2.5-r3","2.6-r0","2.6-r1","2.6-r10","2.6-r11","2.6-r12","2.6-r13","2.6-r14","2.6-r15","2.6-r2","2.6-r3","2.6-r4","2.6-r5","2.6-r6","2.6-r7","2.6-r8","2.6-r9","2.7-r0","2.7-r1","2.7-r2","2.7-r3","2.8-r0","2.8-r1","2.9-r0","2.9-r1","2.9-r10","2.9-r11","2.9-r12","2.9-r13","2.9-r14","2.9-r15","2.9-r16","2.9-r17","2.9-r2","2.9-r3","2.9-r4","2.9-r5","2.9-r6","2.9-r7","2.9-r8","2.9-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2023-52160.json"}},{"package":{"name":"wpa_supplicant","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/wpa_supplicant?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.10-r11"}]}],"versions":["0.5.11-r0","0.6.10-r0","0.6.9-r0","0.6.9-r1","0.7.1-r0","0.7.1-r1","0.7.1-r2","0.7.2-r0","0.7.2-r1","0.7.2-r2","0.7.3-r0","0.7.3-r1","0.7.3-r2","1.0-r0","1.0-r1","1.0-r2","1.1-r0","1.1-r1","2.0-r0","2.0-r1","2.0-r2","2.0-r3","2.1-r0","2.1-r1","2.1-r2","2.10-r0","2.10-r1","2.10-r10","2.10-r2","2.10-r3","2.10-r4","2.10-r5","2.10-r6","2.10-r7","2.10-r8","2.10-r9","2.2-r0","2.3-r0","2.3-r1","2.4-r0","2.4-r1","2.4-r2","2.4-r3","2.4-r4","2.4-r5","2.4-r6","2.4-r7","2.4-r8","2.5-r0","2.5-r1","2.5-r2","2.5-r3","2.6-r0","2.6-r1","2.6-r10","2.6-r11","2.6-r12","2.6-r13","2.6-r14","2.6-r15","2.6-r2","2.6-r3","2.6-r4","2.6-r5","2.6-r6","2.6-r7","2.6-r8","2.6-r9","2.7-r0","2.7-r1","2.7-r2","2.7-r3","2.8-r0","2.8-r1","2.9-r0","2.9-r1","2.9-r10","2.9-r11","2.9-r12","2.9-r13","2.9-r14","2.9-r15","2.9-r16","2.9-r17","2.9-r2","2.9-r3","2.9-r4","2.9-r5","2.9-r6","2.9-r7","2.9-r8","2.9-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2023-52160.json"}},{"package":{"name":"wpa_supplicant","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/wpa_supplicant?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.10-r11"}]}],"versions":["0.5.11-r0","0.6.10-r0","0.6.9-r0","0.6.9-r1","0.7.1-r0","0.7.1-r1","0.7.1-r2","0.7.2-r0","0.7.2-r1","0.7.2-r2","0.7.3-r0","0.7.3-r1","0.7.3-r2","1.0-r0","1.0-r1","1.0-r2","1.1-r0","1.1-r1","2.0-r0","2.0-r1","2.0-r2","2.0-r3","2.1-r0","2.1-r1","2.1-r2","2.10-r0","2.10-r1","2.10-r10","2.10-r2","2.10-r3","2.10-r4","2.10-r5","2.10-r6","2.10-r7","2.10-r8","2.10-r9","2.2-r0","2.3-r0","2.3-r1","2.4-r0","2.4-r1","2.4-r2","2.4-r3","2.4-r4","2.4-r5","2.4-r6","2.4-r7","2.4-r8","2.5-r0","2.5-r1","2.5-r2","2.5-r3","2.6-r0","2.6-r1","2.6-r10","2.6-r11","2.6-r12","2.6-r13","2.6-r14","2.6-r15","2.6-r2","2.6-r3","2.6-r4","2.6-r5","2.6-r6","2.6-r7","2.6-r8","2.6-r9","2.7-r0","2.7-r1","2.7-r2","2.7-r3","2.8-r0","2.8-r1","2.9-r0","2.9-r1","2.9-r10","2.9-r11","2.9-r12","2.9-r13","2.9-r14","2.9-r15","2.9-r16","2.9-r17","2.9-r2","2.9-r3","2.9-r4","2.9-r5","2.9-r6","2.9-r7","2.9-r8","2.9-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2023-52160.json"}},{"package":{"name":"wpa_supplicant","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/wpa_supplicant?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.10-r11"}]}],"versions":["0.5.11-r0","0.6.10-r0","0.6.9-r0","0.6.9-r1","0.7.1-r0","0.7.1-r1","0.7.1-r2","0.7.2-r0","0.7.2-r1","0.7.2-r2","0.7.3-r0","0.7.3-r1","0.7.3-r2","1.0-r0","1.0-r1","1.0-r2","1.1-r0","1.1-r1","2.0-r0","2.0-r1","2.0-r2","2.0-r3","2.1-r0","2.1-r1","2.1-r2","2.10-r0","2.10-r1","2.10-r10","2.10-r2","2.10-r3","2.10-r4","2.10-r5","2.10-r6","2.10-r7","2.10-r8","2.10-r9","2.2-r0","2.3-r0","2.3-r1","2.4-r0","2.4-r1","2.4-r2","2.4-r3","2.4-r4","2.4-r5","2.4-r6","2.4-r7","2.4-r8","2.5-r0","2.5-r1","2.5-r2","2.5-r3","2.6-r0","2.6-r1","2.6-r10","2.6-r11","2.6-r12","2.6-r13","2.6-r14","2.6-r15","2.6-r2","2.6-r3","2.6-r4","2.6-r5","2.6-r6","2.6-r7","2.6-r8","2.6-r9","2.7-r0","2.7-r1","2.7-r2","2.7-r3","2.8-r0","2.8-r1","2.9-r0","2.9-r1","2.9-r10","2.9-r11","2.9-r12","2.9-r13","2.9-r14","2.9-r15","2.9-r16","2.9-r17","2.9-r2","2.9-r3","2.9-r4","2.9-r5","2.9-r6","2.9-r7","2.9-r8","2.9-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2023-52160.json"}},{"package":{"name":"wpa_supplicant","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/wpa_supplicant?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.10-r11"}]}],"versions":["0.5.11-r0","0.6.10-r0","0.6.9-r0","0.6.9-r1","0.7.1-r0","0.7.1-r1","0.7.1-r2","0.7.2-r0","0.7.2-r1","0.7.2-r2","0.7.3-r0","0.7.3-r1","0.7.3-r2","1.0-r0","1.0-r1","1.0-r2","1.1-r0","1.1-r1","2.0-r0","2.0-r1","2.0-r2","2.0-r3","2.1-r0","2.1-r1","2.1-r2","2.10-r0","2.10-r1","2.10-r10","2.10-r2","2.10-r3","2.10-r4","2.10-r5","2.10-r6","2.10-r7","2.10-r8","2.10-r9","2.2-r0","2.3-r0","2.3-r1","2.4-r0","2.4-r1","2.4-r2","2.4-r3","2.4-r4","2.4-r5","2.4-r6","2.4-r7","2.4-r8","2.5-r0","2.5-r1","2.5-r2","2.5-r3","2.6-r0","2.6-r1","2.6-r10","2.6-r11","2.6-r12","2.6-r13","2.6-r14","2.6-r15","2.6-r2","2.6-r3","2.6-r4","2.6-r5","2.6-r6","2.6-r7","2.6-r8","2.6-r9","2.7-r0","2.7-r1","2.7-r2","2.7-r3","2.8-r0","2.8-r1","2.9-r0","2.9-r1","2.9-r10","2.9-r11","2.9-r12","2.9-r13","2.9-r14","2.9-r15","2.9-r16","2.9-r17","2.9-r2","2.9-r3","2.9-r4","2.9-r5","2.9-r6","2.9-r7","2.9-r8","2.9-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2023-52160.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}