The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3738-1 | iwd security update |
Debian DSA |
DSA-5631-1 | iwd security update |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 19:30:00 +0000
Tue, 04 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-04T22:05:31.145Z
Reserved: 2023-12-29T00:00:00.000Z
Link: CVE-2023-52161
Updated: 2025-11-04T22:05:31.145Z
Status : Modified
Published: 2024-02-22T17:15:08.327
Modified: 2025-11-04T22:15:57.307
Link: CVE-2023-52161
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA