Vulnerability, Potential Exploit In Cisco WLAN APs 35
An anonymous reader writes "The AirMagnet Intrusion Research Team has uncovered a new wireless vulnerability and potential exploit associated with Cisco wireless LAN infrastructure. The vulnerability involves Cisco's Over-the-Air-Provisioning (OTAP) feature found in its wireless access points. The potential exploit, dubbed SkyJack by AirMagnet, creates a situation whereby control of a Cisco AP can be obtained, whether intentionally or unintentionally, to gain access to a customer's wireless LAN."
say that again? (Score:1)
exploit, unintentionally?
Re: (Score:1)
Hell, remember the old Windows where you could click Cancel to log in?
Re: (Score:2, Interesting)
I suppose I should clarify:
Although the article states, "This ultimately could lead to an enterpriseÃ(TM)s access point connecting outside of the company to an outside controller, and therefore being under outside control." Most business buildings are both large and concrete, there's a reason you find many access points, it's because the signal doesn't travel well, even from the hall to the back of a hotel room.
Most people don't carry around running access points, especially cisco ones, and just happen
Re: (Score:1)
Unintentionally? (Score:3, Interesting)
a situation whereby control of a Cisco AP can be obtained, whether intentionally or unintentionally, to gain access to a customer's wireless LAN.
Unintentionally?
It's one thing to accept that in the perpetual arms race you'll regularly fall behind and your job is to limit those situations to a manageable minimum. It's a completely differnt matter when a non threatening actor may stumble upon a vulnerability.
"Yes, sir, the bank doors do open automatically when a stray cat passes in front of it at night. You see, cats have precisely the size we didn't account for in our supersecure doors."
Unintentionally? (Score:3, Insightful)
How do you unintentionally gain access to something? How should I picture this? "Gee, officer, I was leaning against this door and then it suddenly opened and I tripped and then I must have stumbled into the jewelry box and all those rings just happened to pour into my pockets, dunno how this happened..."
Re:Unintentionally? (Score:4, Insightful)
If, say, you have a bog standard XP laptop, with a bittorrent client or other uPNP-using application running on it, and you start it up within range of an open AP, you could very well connect to somebody else's network and reconfigure their router all automatically. Never mind what might happen if your box is 0wn3d and full of malware that might attempt to automatically spread to other machines on the network you just joined.
Technology has its share of "Golly shucks, officer, I dunno how this happened" excuses; but it also has huge amounts of automation going on.
Re: (Score:3, Interesting)
Good arguments.
Ok, then we should try to work out a way that disallows this. Guess it comes down to good ol' security and lack thereof. Not necessarily on the "culprit"'s side, i.e. the one (or the one's computer, respectively) that trespasses, more on the side of a piece of autoconf'-able piece of hardware that isn't secured properly.
So who's to blame if something like this happens?
Re: (Score:3, Interesting)
The only real fix would be better security on the side of the autoconfigurable hardware. Unfortunately,
Re: (Score:2)
I'd make it a requirement to connect at least once with a cable to do the initial configuration, where you must enter some sort of passphrase which is then used to authenticate. That way even some permanently broadcasting malware that tries to hijack the WiFi hardware before you could configure it will be locked out. It's not that much of a hassle for the user and the steps required could be put into the manual. Linksys already has those "use this CD before plugging in" steps in its installation routine (ev
Config option, not all that bad (Score:4, Interesting)
Re:Config option, not all that bad (Score:4, Insightful)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Config managers don't have to be complicated or expensive (see RANCID......
We want......a SHRUBBERY!
Ni...ni...ni!!!
(For the mods....RANCID is a tool made by Shrubbery Networks....)
Re: (Score:3, Informative)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
It should have been selected as OFF by default though...and most will not think to go looking for this vulnerability, if they even know it exists...!
The only real security.... (Score:2)
.... Is a wire from the computer to the network.
Re: (Score:3, Interesting)
.... Is a wire from the computer to the network.
There is no such thing as real security, the best you can hope for is secure enough, so no one wants to waste time with you.
Re: (Score:2)
Bingo.
I'm dealing with this at my work right now. We have WAPs set with WEP all over the place, and yes, I know WEP has been cracked for a while and is trivial to break. However trying to secure WAPs while the rest of our infrastructure is wide open is as stupid as putting a bars and locks on the windows while the doggy door is unsecured.
We're a school district, so I'm not worried about people hacking into the network via WAPs, especially when it would be easier to enter into an unoccupied classroom and plu
Re: (Score:2)
Re: (Score:1)
Re: (Score:2, Informative)
O RLY?
"Power sockets can be used to eavesdrop on what people type on a computer."
http://news.bbc.co.uk/2/hi/technology/8147534.stm
In this case the hardwire is the problem.
Not an Exploit, A Slashvertizement (Score:2)
If you actually read the article, you will realize this is a non-issue. Basically, if you install a new, non provisioned access point, it is vulnerable to being assigned to a fake controller. This won't give access to your network. It will give them control of a rogue AP, but that's about it. There is nothign here you couldn't do if you stuck an AP of your own somewhere nearby. The article gives no method for taking control of an existing provision access point, or gaining access to any data on the net
Re: (Score:1)
This is why i disable (Score:2)
OTAP and UPNP from the beginning on any Linksys/Cisco hardware. Personally I see absolutely no reason even in a Home network to enable either of those features for just this possible reason. Sure it's a bit more effort to configure things using a wired connection. The main advantage is I don't have to worry about a badly implemented version of UPNP (lots of apps include it) that can screw MY internet connection up. Hell I don't even want the potential for someone to even use UPNP to configure my router so t
Re: (Score:2)