Flaw in Billions of Wi-Fi Devices Left Communications Open To Eavesdropping (arstechnica.com) 33
Billions of devices -- many of them already patched -- are affected by a Wi-Fi vulnerability that allows nearby attackers to decrypt sensitive data sent over the air, researchers said on Wednesday at the RSA security conference. From a report: The vulnerability exists in Wi-Fi chips made by Cypress Semiconductor and Broadcom, the latter a chipmaker Cypress acquired in 2016. The affected devices include iPhones, iPads, Macs, Amazon Echos and Kindles, Android devices, Raspberry Pi 3's, and Wi-Fi routers from Asus and Huawei. Eset, the security company that discovered the vulnerability, said the flaw primarily affects Cyperess' and Broadcom's FullMAC WLAN chips, which are used in billions of devices. Eset has named the vulnerability Kr00k, and it is tracked as CVE-2019-15126.
Manufacturers have made patches available for most or all of the affected devices, but it's not clear how many devices have installed the patches. Of greatest concern are vulnerable wireless routers, which often go unpatched indefinitely. "This results in scenarios where client devices that are unaffected (either patched or using different Wi-Fi chips not vulnerable to Kr00k) can be connected to an access point (often times beyond an individual's control) that is vulnerable," Eset researchers wrote in a research paper published on Wednesday. "The attack surface is greatly increased, since an adversary can decrypt data that was transmitted by a vulnerable access point to a specific client (which may or may not be vulnerable itself)."
Manufacturers have made patches available for most or all of the affected devices, but it's not clear how many devices have installed the patches. Of greatest concern are vulnerable wireless routers, which often go unpatched indefinitely. "This results in scenarios where client devices that are unaffected (either patched or using different Wi-Fi chips not vulnerable to Kr00k) can be connected to an access point (often times beyond an individual's control) that is vulnerable," Eset researchers wrote in a research paper published on Wednesday. "The attack surface is greatly increased, since an adversary can decrypt data that was transmitted by a vulnerable access point to a specific client (which may or may not be vulnerable itself)."
Just when I replaced all these... (Score:2)
just replaced all my Broadcom based routers last month.. Lucky me!
Re: (Score:2)
I stay as far away from them as possible because they are usually very difficult for OpenWRT. UI have used only Qualcomm/Atheros for the last decade and I am not about to change that policy. Doubly so - afer looking at how ridiculously trivial this exploit is.
Who uses WiFi without end-to-end encryption? (Score:3, Insightful)
Seriously, as long as an attacker can only listen in, this is not a problem for anybody that uses sound practices.
Re: (Score:3, Funny)
Re: (Score:3)
Re:Who uses WiFi without end-to-end encryption? (Score:4, Informative)
Re: (Score:2)
Re: (Score:3)
Nope. If you use sound end-to-end encryption, the attacker can decrypt exactly nothing.
Re: (Score:2)
Re: (Score:2)
That is why I wrote "sound". Incidentally, if your end-to-end encryption is unsound, then having some links encrypted on top will not really save your day...
Re: (Score:3)
I would assume that means they can decrypt the WPA layer. If you're using something like ssh or HTTPS, that encryption will still be intact.
You are correct. From TFA:
"While the vulnerability is interesting and users should make sure their devices are patched quickly—if they aren’t already—there are a few things that minimize the real-world threat posed. For one thing, most sensitive communications in 2020 are already encrypted, usually with the transport layer security protocol or by other methods."
Re: (Score:2)
Diffie–Hellman is used to secure a variety of Internet services. However, research published in October 2015 suggests that the parameters in use for many DH Internet applications at that time are not strong enough to prevent compromise by very well-funded attackers, such as the security services of large government.
It would add an extra layer of security if attackers could not eavesdrop so the key exchange would be more secure..
Re: (Score:2)
If a passive listener can break your key-exchange, you have lost. Putting some additional weak encryption of top is not helping this.
Re: (Score:2)
Re: (Score:2)
Everybody in reach can listen to your traffic on WiFi. The question is only what they can read.
Re: (Score:3)
What? “As long as a hacker can only listen in . . .” The first sentence of this article clearly says that a WiFi vulnerability allows hackers to “decrypt data over the air”.
All of the communication I care about is encrypted, so I don't care much if the attacker can listen in (unless he's also broken SSL). It's more worrying if he can modify data, then there are lots of attacks he can to to try to trick my device into downgrading to using unencrypted data.
Re: (Score:2)
Hi hawguy!
What are your GPS coordinates and WPA password?
Oh, btw don't worry I haven't broken SSL.
37.75585942060785, -122.42760043493558
SSID: TChildsWifi
Passphrase: CanIHazPassword
Re: (Score:2)
When you type your password you see "CanIHazPassword" on your screen but all I see are asterisks like this "***************".
I don't know how they do it. Must be a bunch o' F'in geniuses writing their code.
Re: (Score:2)
Google Maps my dude. Don't post your GPS coordinates in a public forum.
Re: (Score:2)
So, 937 or 941 Church St. San Francisco, CA.
Google Maps my dude. Don't post your GPS coordinates in a public forum.
What!? You mean there's a way to map GPS coordinates and turn them into an address? Why I had no idea! Well, I guess LAN party at my house now that everyone has my wifi password.
Re: (Score:2)
Re: Who uses WiFi without end-to-end encryption? (Score:2)
Re: (Score:2)
That is the link-encryption, not end-to-end encryption.
Re: Who uses WiFi without end-to-end encryption? (Score:2)
Re: (Score:2)
They can't. All they can do is get a few Kb of data that the chipset failed to clear out of the
tx buffer after clearing the crypto key for a device that was leaving the AP. So if they want
any appreciable amount of content they have to cause a lot of disassociations using forged
control packets, which would cause the user to experience crummy WiFi performance. Not
that that stops WiFi hackers since forcing lots of disconnects is part of the method used
to compromise WPA2-personal.
Broadcom Cypress testing must be pathetic (Score:2)
CVE-2019-15126 (Score:1)
The bug/attack In a nutshell (Score:1)