CVE-2023-53540Improper Input Validation in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: reject auth/assoc to AP with our address If the AP uses our own address as its MLD address or BSSID, then clearly something's wrong. Reject such connections so we don't try and fail later.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel2.6.326.1.55+1
Debianlinux/linux_kernel< 6.1.55-1+2
CVEListV5linux/linux19957bb399e2722719c0e20c9ae91cf8b6aaff04676a423410131d111a264d29aecbe6aadd57fb22+3
debiandebian/linux< linux 6.1.55-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53540: In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: reject auth/assoc to AP with our address If the AP uses our own ad2025-10-04
GHSA
GHSA-83qc-9rcf-r226: In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: reject auth/assoc to AP with our address If the AP uses our own2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: wifi: cfg80211: reject auth/assoc to AP with our address2025-10-04
Debian
CVE-2023-53540: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80...2023