In open packages iwd (Intel inet Wireless Daemon) and WPA_SUPPLICANT used to organize client linux systems to a wireless network, vulnerabilities leading to the bypass of authentication mechanisms were identified.
In iwd, the vulnerability identified (cve-2023-52161) is manifested only when the access point is turned on, typically used for connecting to wireless networks. The vulnerability allows connection to the created access point without knowing the password, for example, when the user enables network access through their device (Hotspot). The issue has been fixed in version IWD 2.14. The attacker can bypass the second stage message to immediately send a message of the fourth stage and gain access to the network without proper authentication.
Additionally, in WPA_SUPPLICANT, a problem identified (cve-2023-52160) allows the attacker to create a fake wireless network matching the one the user intends to connect to. If the user connects to the fake network, the attacker can intercept the user’s unencrypted transit traffic. More details.