[MIT TR] Wifi encryption useless? New exploit, affecting over a BILLION devices.

ch33zw1z

Lifer
Nov 4, 2004
38,001
18,349
146
Looks like the article states updates deployed to remedy the issue. Obviously, this depends on your device and how fast the vendor deploys the updates.
 

VirtualLarry

No Lifer
Aug 25, 2001
56,452
10,120
126
Yeah, I'm worried about one of my relative's routers, a cheap older D-Link model, that no longer receives updates.
 

mxnerd

Diamond Member
Jul 6, 2007
6,799
1,101
126

ATTACK VECTORS: EXPLOITING THE VULNERABILITY
Since Kr00k (encryption with an all-zero TK) manifests itself following a disassociation, an adversary can exploit this by manually triggering disassociations – as opposed to the disassociations that occur naturally.

This is possible, because a disassociation can be triggered by a management data frame that’s unauthenticated and unencrypted. There are possibly even other methods or events that can cause a disassociation (e.g. transmitting malcrafted packets, EAPOLs, etc.) – and/or to trigger Kr00k.

Unauthorized reading - decryption of data
As explained in the previous section, after a disassociation occurs, data from the chip’s Tx buffer will be transmitted encrypted with the all-zero TK. These data frames can be captured by an adversary and subsequently decrypted. This data can contain several kilobytes of potentially sensitive information.

My understanding is that even if the data is captured, it still needs to be decrypted. Correct?

AFFECTED DEVICES (client)
The vulnerability primarily affects FullMAC WLAN chips manufactured by Broadcom and Cypress. These chip manufacturers have a high market share – it is safe to say that Broadcom chips are used by the majority of today’s Wi-Fi capable devices. Cypress chips are widely used in IoT devices.

The client devices that we positively tested in our lab to be vulnerable to Kr00k include:

• Amazon Echo 2nd gen
• Amazon Kindle 8th gen
• Apple iPad mini 2
• Apple iPhone 6, 6S, 8, XR
• Apple MacBook Air Retina 13-inch 2018
• Google Nexus 5
• Google Nexus 6
• Google Nexus 6S
• Raspberry Pi 3
• Samsung Galaxy S4 GT-I9505
• Samsung Galaxy S8
• Xiaomi Redmi 3S


We estimate that the number of affected devices, prior to patching, was well over a billion as the billion mark is passed by counting only the number of affected iPhone generations we tested.

We have also tested some devices with Wi-Fi chips from other manufacturers, including Qualcomm, Realtek, Ralink, Mediatek and did not see the vulnerability manifest itself. Obviously, we have not tested every possible Wi-Fi chip by every manufacturer, so while we are currently not aware of other affected chips, we also cannot rule this out.


Vulnerable access points
Of great concern is that not only client devices but also Wi-Fi access points and routers are affected by Kr00k.

This results in scenarios where client devices that are unaffected (either patched or using different Wi-Fi chips not vulnerable to Kr00k) can be connected to an access point (often times beyond an individual’s control) that is vulnerable. The attack surface is greatly increased, since an adversary can decrypt data that was transmitted by a vulnerable access point to a specific client (which may or may not be vulnerable itself).

In our lab, we were able to confirm that some wireless routers by ASUS and Huawei were vulnerable in this way.

Specifically, we positively tested:
• Asus RT-N12
• Huawei B612S-25d
• Huawei EchoLife HG8245H
• Huawei E5577Cs-321


==

Seems more related to client devices?
 
Last edited:
Reactions: ch33zw1z

mxnerd

Diamond Member
Jul 6, 2007
6,799
1,101
126


So maybe most ASUS routers are not affected?
 
Reactions: ch33zw1z
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |