NEWS

3893

A new standard for Wi-Fi protection was hacked before the release of the first routers

12 April 2019 - 11:00 | Interesting information
A new standard for Wi-Fi protection was hacked before the release of the first routers

In 2017, Mathy Vanhoef and Eyal Ronen uncovered a number of critical vulnerabilities in the WPA2 protocol, which is used in almost all modern secured Wi-Fi networks. Vulnerabilities received the general name KRACK (Key Reinstallation Attacks).

Now, these same experts found no less dangerous vulnerabilities in the latest protocol WPA3. Vulnerabilities called Dragonblood use a communications mechanism. In WPA3, the mechanism is called Dragonfly (dragonfly) and until that moment was considered reliable and protected.

There are five types of vulnerabilities in Dragonblood: denial of service, two vulnerabilities with lower network protection and two vulnerabilities with side channel attacks. Denial of service leads to the fact that the user can not connect to the network, while other types allow an attacker to get passwords and track information.

The international Wi-Fi Alliance Alliance has already been informed about Dragonblood. It now remains to wait until manufacturers patch up these vulnerabilities for their products.