Skip to content

Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse

Researcher Mathy Vanhoef of imec-DistriNet hax found a critical flaw in the current WPA2 protocol.

We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.

The kicker here is that if WPA2 is implemented per the standard, it is vulnerable.

The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected.

Check out their demo:

Full article at krackattacks.com

 

Published inhackingSecurity

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *