MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
wpa
Search

Dragonblood Vulnerabilities Disclosed in Wi-Fi WPA3 Standard

Thursday April 11, 2019. 04:40 PM , from Slashdot
Two security researchers disclosed details this week about a group of vulnerabilities collectively referred to as Dragonblood that impact the Wi-Fi Alliance's recently launched WPA3 Wi-Fi security and authentication standard. From a report: If ever exploited, the vulnerabilities would allow an attacker within the range of a victim's network to recover the Wi-Fi password and infiltrate the target's network. In total, five vulnerabilities are part of the Dragonblood ensemble -- a denial of service attack, two downgrade attacks, and two side-channel information leaks.

While the denial of service attack is somewhat unimportant as it only leads to crashing WPA3-compatible access points, the other four are the ones that can be used to recover user passwords. Both the two downgrade attacks and two side-channel leaks exploit design flaws in the WPA3 standard's Dragonfly key exchange -- the mechanism through which clients authenticate on a WPA3 router or access point. In a downgrade attack, Wi-Fi WPA3-capable networks can be coerced in using an older and more insecure password exchange systems, which can allow attackers to retrieve the network passwords using older flaws.

Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/623vULmt6nY/dragonblood-vulnerabilities-disclosed-in-wi-fi-...
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
May, Fri 10 - 14:46 CEST