VYPR
Medium severity5.5NVD Advisory· Published Oct 4, 2025· Updated Apr 6, 2026

CVE-2023-53540

CVE-2023-53540

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: reject auth/assoc to AP with our address

If the AP uses our own address as its MLD address or BSSID, then clearly something's wrong. Reject such connections so we don't try and fail later.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel wifi cfg80211 now rejects authentication/association to an AP that uses the client's own MAC address as BSSID or MLD address, preventing connection failures.

Vulnerability

Description

The Linux kernel's cfg80211 subsystem lacked a check to prevent a station from attempting to authenticate or associate with an access point that uses the station's own MAC address as its BSSID or MLD address. This could occur due to misconfiguration or a malicious AP. The patch adds a sanity check to reject such connections early [1][2][3].

Exploitation

An attacker could set up a rogue AP with the same MAC address as the target client. When the client attempts to connect, the kernel would proceed with the authentication/association process, which would eventually fail or cause unexpected behavior. The attack requires the attacker to be within radio range and have the ability to spoof the client's MAC address as the AP's BSSID.

Impact

Without the fix, the client would waste resources attempting to connect and may experience connection failures or instability. The patch prevents this by rejecting the connection at the cfg80211 layer, avoiding unnecessary retries and potential confusion.

Mitigation

The fix has been backported to stable kernel versions. Users should update their kernels to include the commit. No workaround is mentioned.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernel2 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=2.6.32,<6.1.55
    • (no CPE)

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.