Loading
The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.
Use CWE-287, Intel vendor hub and Inet Wireless Daemon product page to widen CVE-2023-52161 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2020-17497, CVE-2024-28084 and CVE-2020-8689 for nearby disclosures in the same product family.