CVE-2022-23303

9.8 CRITICAL

📋 TL;DR

CVE-2022-23303 is a side-channel vulnerability in SAE (Simultaneous Authentication of Equals) implementations in hostapd and wpa_supplicant that allows attackers to recover Wi-Fi passwords by analyzing cache access patterns during authentication. This affects systems using WPA3 or WPA2 with SAE authentication. The vulnerability results from an incomplete fix for CVE-2019-9494.

💻 Affected Systems

Products:
  • hostapd
  • wpa_supplicant
Versions: hostapd before 2.10, wpa_supplicant before 2.10
Operating Systems: Linux, Unix-like systems, Embedded systems using these packages
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using WPA3 or WPA2 with SAE (also known as WPA3-Personal). WPA2 with traditional PSK authentication is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers within Wi-Fi range can recover network passwords, gaining unauthorized access to encrypted Wi-Fi networks and potentially intercepting sensitive communications.

🟠

Likely Case

Local attackers with physical proximity to target networks can capture authentication handshakes and perform offline analysis to recover passwords over time.

🟢

If Mitigated

With proper patching and network segmentation, impact is limited to isolated Wi-Fi segments with no access to critical systems.

🌐 Internet-Facing: MEDIUM - Requires physical proximity to Wi-Fi networks but affects internet-facing access points.
🏢 Internal Only: MEDIUM - Internal Wi-Fi networks are vulnerable if attackers gain physical access to premises.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires capturing authentication handshakes and performing timing analysis. Tools exist for similar side-channel attacks on Wi-Fi.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: hostapd 2.10+, wpa_supplicant 2.10+

Vendor Advisory: https://w1.fi/security/2022-1/

Restart Required: Yes

Instructions:

1. Update hostapd and wpa_supplicant packages to version 2.10 or later. 2. Restart affected services. 3. For embedded systems, update firmware from vendor.

🔧 Temporary Workarounds

Disable SAE authentication

linux

Temporarily disable SAE/WPA3 and use WPA2 with traditional PSK authentication

Edit /etc/hostapd/hostapd.conf and set wpa_key_mgmt=WPA-PSK
Edit /etc/wpa_supplicant/wpa_supplicant.conf and use WPA2-PSK

🧯 If You Can't Patch

  • Segment Wi-Fi networks from critical systems using firewalls and VLANs
  • Implement certificate-based authentication (WPA3-Enterprise) instead of SAE

🔍 How to Verify

Check if Vulnerable:

Check installed versions: hostapd --version && wpa_supplicant --version

Check Version:

hostapd --version 2>/dev/null || echo 'hostapd not installed'; wpa_supplicant --version 2>/dev/null || echo 'wpa_supplicant not installed'

Verify Fix Applied:

Verify versions are 2.10 or higher and check that SAE authentication still works properly

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed SAE authentication attempts
  • Unusual timing patterns in authentication logs

Network Indicators:

  • Excessive SAE handshake captures
  • Unusual devices attempting SAE authentication

SIEM Query:

source="hostapd.log" AND "SAE" AND ("failed" OR "timing")

🔗 References

📤 Share & Export