Cybersecurity researchers have uncovered two authentication bypass vulnerabilities in open-source Wi-Fi software utilized in Android, Linux, and ChromeOS devices. Tracked as CVE-2023-52160 and CVE-2023-52161, these flaws were identified during a security assessment of wpa_supplicant and Intel's iNet Wireless Daemon (IWD), respectively. According to research conducted by Top10VPN in collaboration with Mathy Vanhoef, CVE-2023-52160 could allow attackers to deceive users into connecting to malicious clones of legitimate networks or gain unauthorized access to trusted networks without a password. Conversely, CVE-2023-52161 poses a significant risk, particularly impacting IWD versions 2.12 and below, by enabling unauthorized access to protected Wi-Fi networks. CVE-2023-52160 affects wpa_supplicant versions 2.10 and earlier, primarily impacting Android devices that utilize the software as the default handler for wireless network login requests. However, successful exploitation depends on Wi-Fi clients lacking proper configuration to verify the authentication server's certificate. In contrast, CVE-2023-52161 impacts any network employing a Linux device as a wireless access point (WAP). Mitigation efforts have been undertaken by major Linux distributions such as Debian, Red Hat, SUSE, and Ubuntu, with advisories released addressing the vulnerabilities. While ChromeOS versions 118 and later have addressed the wpa_supplicant issue, fixes for Android devices are pending. In the interim, Android users are advised to manually configure the CA certificate of any saved enterprise networks to mitigate potential risks, as highlighted by Top10VPN.