{"uuid": "cdb6dd11-efbd-4a40-beeb-f0f4c6261dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52161", "type": "seen", "source": "https://t.me/androidMalware/2159", "content": "New WiFi authentication vulnerabilities discovered affecting Android, ChromeOS and Linux devices\nCVE-2023-52160 (\u201cPhase-2 bypass\u201d): This vulnerability can be exploited by an attacker to deceive the victim into connecting to a fake Wi-Fi network set up by the adversary. Once connected, the attacker can intercept and monitor the victim\u2019s network traffic\nCVE-2023-52161 (\u201c4-way bypass\u201d): It allows an adversary to gain full access to an existing protected WiFi network, exposing existing users and devices\nPoC exploit is not available.\nhttps://www.top10vpn.com/research/wifi-vulnerabilities/", "creation_timestamp": "2024-03-05T16:54:02.000000Z"}