Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»WIFI»New WiFi authentication vulnerability discovered
WIFI

New WiFi authentication vulnerability discovered

5gantennas.orgBy 5gantennas.orgFebruary 13, 2024No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


We worked with Professor Vanhoef to identify critical security flaws in two instances of commonly used open source WiFi software that expose users to traffic interception and other attacks.

The first attack is the user connect to Enterprise WiFi network, the second is existing Home network.

Our goal in publishing this research is to help improve the security of wireless networks by identifying critical software vulnerabilities so vendors can patch them and ensure the public is informed. is to improve standards.

We also want to raise public awareness of the risks associated with using shared networks and share advice on how to protect against them.

What devices are affected?

Vulnerabilities that affect wpa_supplicant v2.10 and earlier (CVE-2023-52160) is of particular concern because it is the default software used by Android devices to handle login requests to wireless networks.

Therefore, 2.3 billion Android users worldwide could be affected by this vulnerability.[1]

of wpa_supplicant This software is available not only on ChromeOS, the operating system used on Chromebooks, which are very popular in educational settings, but also on nearly all Linux devices.

on the other hand, wpa_supplicant This vulnerability only affects WiFi clients that are not properly configured to validate the authentication server’s certificate. Recent research has unfortunately shown that this happens frequently, especially on affected devices.[2]

The IWD v2.13 and earlier vulnerability (CVE-2023-52161) is Linux-only WiFi software, so fewer people are affected.However, it affects everyone This vulnerability does not rely on misconfiguration and uses IWD as the access point.

Developed by Intel, IWD is a comprehensive connectivity solution for Linux and is intended to eventually become a Linux replacement. wpa_supplicant.[3] It is available in the official package managers of all major Linux distributions.

What types of WiFi networks are at risk?

vulnerability of wpa_supplicant Affects WiFi networks that use WPA2/3 Enterprise mode instead of the less secure Personal mode that is common in home WiFi networks.

Ironically, the security flaws identified in this report are related to the possible exploitation of the mutual authentication process, which exists only in Enterprise Mode, which is generally recommended for use by large enterprises.

Meanwhile, IWD vulnerabilities affect home WiFi networks.

How can these new vulnerabilities be exploited?

of wpa_supplicant This vulnerability allows a malicious attacker to trick a victim into automatically connecting to a malicious clone of a trusted WiFi network and intercept their traffic.

This attack does not require the victim to do anything, so the victim is likely not aware that he or she has been targeted.

To exploit this vulnerability, an attacker only needs the SSID of an enterprise WPA2/3 network that the victim has previously connected to and is within range of the victim.

One possible scenario is that an attacker roams around a company building and scans the network before targeting employees as they leave the office.

IWD vulnerabilities are different in that they allow attackers full access to existing protected WiFi networks, exposing existing users and devices to attack.

The risk of such attacks is particularly significant for small and medium-sized businesses using this type of WiFi network, and includes:

  • Interception of sensitive data
  • Malware infection
  • ransomware attack
  • Business email compromise
  • password theft

How to defend against these attacks

Both vulnerabilities were reported to the vendor, patched, and available as part of a public code repository.

IWD releases updates frequently, so the usual advice regarding software and operating system updates still applies.

However, the OS you use determines how easy it is to secure your device. wpa_supplicant Vulnerability.

ChromeOS At least version 118 and later has been patched so users can easily update to the latest version.

Linux However, users are dependent on distributions providing patched versions. wpa_supplicant. Typically this is not done by default, so maintainers must ensure that the patch is backported to the environment in which it was provided. wpa_supplicant version.

android Unfortunately, users will have to wait for new Android security updates that include: wpa_supplicant patch. Unfortunately, this can take months or even years.

Therefore, in the meantime, it is important for Android users to manually configure stored enterprise network CA certificates to prevent attacks.

University students and employees connected to eduroam can also use CAT tools to securely configure Android. Her latest Android device can also use Trust-on-First-Use (TOFU) to automatically trust his CA certificate when it connects to the network for the first time.

A prudent precaution may be to clean up unused WPA2/3 enterprise networks and turn off automatic reconnection for that type of network that is used regularly.

We recommend regularly using a VPN for public WiFi networks as an additional layer of protection. This encrypts your internet traffic and at least prevents it from being intercepted by an attacker.

Check out our recommendations for the most reliable VPNs for Android and Linux. Android VPN recommendations also apply to ChromeOS users.

Although a VPN protects your Internet traffic from malicious attackers, it cannot protect against all types of attacks resulting from these or future vulnerabilities.

The following sections provide more details about the two vulnerabilities.

For a complete technical analysis and all the relevant background, download the “Bypassing WiFi Authentication in Modern WPA2/3 Networks” report by Mathy Vanhoef and Héloïse Gollier.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOpinion | AI: The US and China must overcome zero-sum competition
Next Article SMLight launches Zigbee Ethernet/WiFi coordinator and USB adapter based on TI CC2652P7 or CC2674P10 wireless chips
5gantennas.org
  • Website

Related Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

Best WiFi deal: Save $200 on the Starlink Standard Kit AX

August 29, 2024

Sonos Roam 2 review | Good Housekeeping UK

August 29, 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Apple focuses on 6G for future iPhones

By 5gantennas.orgDecember 11, 2023

iPhone 15 Pro and Pro MaxWith Apple’s recent listing of cellular platform architects to work…

All connectivity technologies will be integrated in the 6G era, says Abhay Karandikar, DST Secretary, ET Telecom

January 31, 2024

5G-Advanced and 6G networks require additional spectrum

January 24, 2024

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

How 5G will impact entertainment

January 3, 2024

5G technology and its impact on connectivity | By Hafsa Sajjad | January 2024

January 23, 2024

Gogo updates investors on latest 5G delays

August 8, 2023
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.