ZEROTHCODE

zerothcode blog

Hackers News

New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices

 

Cybersecurity researchers today uncovered a new high-severity hardware vulnerability residing in the widely-used Wi-Fi chips manufactured by Broadcom Cybersecurity

and Cypress—apparently powering over a billion devices, including smartphones, tablets, laptops, routers, and IoT gadgets.

Dubbed ‘Kr00k‘ and tracked as CVE-2019-15126, the flaw could let nearby remote attackers intercept

and decrypt some wireless network packets transmitted over-the-air by a vulnerable device.

The attacker does not need to be connected to the victim’s wireless network and the flaw works against vulnerable devices using Cybersecurity

WPA2-Personal or WPA2-Enterprise protocols, with AES-CCMP encryption, to protect their network traffic.

“Our tests confirmed some client devices by Amazon (Echo, Kindle), Apple (iPhone, iPad, MacBook), Google (Nexus), Samsung (Galaxy),

Raspberry (Pi 3), Xiaomi (RedMi), as well as some access points by Asus and Huawei, were vulnerable to Kr00k,” ESET researchers said.

According to the researchers, the Kr00k flaw is somewhat related to the KRACK attack,

a technique that makes it easier for attackers to hack Wi-Fi passwords protected using a widely-used WPA2 network protocol.

First, Learn What Kr00k Attack Doesn’t Allow: Wi-Fi

Before proceeding to details of the new Kr00k attack, it’s important to note that:

  • The vulnerability does not reside in the Wi-Fi encryption protocol; instead, it exists in the way vulnerable chips implemented the encryption,
  • It doesn’t let attackers connect to your Wi-Fi network and launch further man-in-the-middle attacks or exploitation against other connected devices,
  • It does not let attackers know your Wi-Fi password,
  • and also changing it wouldn’t help you patch the issue,
  • It doesn’t affects modern devices using WPA3 protocol, the latest Wi-Fi security standard.
  • However, it does let attackers capture and decrypt some wireless packets (several kilobytes), but there’s no way to predict what data it will include,
  • Most importantly, the flaw breaks encryption on the wireless layer but has nothing to do with TLS encryption that still secures your network traffic with sites using HTTPS. Cybersecurity

 

What is Kr00k Attack & How Does it Work? Cybersecurity

Now you might be wondering what the Kr00k attack then let attackers do?

In brief, a successful attack merely degrades your security a step towards what you’d have on an open Wi-Fi network. Thus,

what sensitive information attackers can capture from a vulnerable device is totally depends upon

the lack of the next layer of network traffic encryption i.e., visiting non-HTTPS websites.

Wi-Fi -password-hacking-attack Cybersecurity
Wi-Fi -password-hacking-attack Cybersecurity

The attack relies on the fact that when a device suddenly gets disconnected from the wireless network,

the Wi-Fi chip clears the session key in the memory and set it to zero,

but the chip inadvertently transmits all data frames left in the buffer with an all-zero encryption key even after the disassociation.

Therefore, an attacker in near proximity to vulnerable devices can use this flaw to repeatedly trigger disassociations by sending de-authentication packets over the air to capture more data frames,

“potentially containing sensitive data, including DNS, ARP, ICMP, HTTP, TCP, and TLS packets.”

Besides this, since the flaw also affects chips embedded in many wireless routers, the issue

also makes it possible for attackers to intercept Cybersecurity

and decrypt network traffic transmitted from connected devices that are not vulnerable to Kr00k,

either patched or using different Wi-Fi chips.

ESET researchers reported this issue to both affected chip manufacturers, Broadcom and Cypress, last year, as well as many affected

device manufacturers who are responsible for developing a patch to mitigate the problem via software or firmware updates for their users.

Apple has already released patches for its users, some should have issued advisory or security patches

at the time of publication, and other vendors are still testing the issue against their devices.

Cybersecurity

 

 

Burp Suite Extension – To Monitor And Keep Track of Tested EndpointsÂ