Severe Wi-Fi Protocol Flaw Puts Everyone at Data Theft Risk: US Government
Severe Wi-Fi Protocol Flaw Puts Everyone at Data Theft Risk: US Government
According to an advisory issued by the US Computer Emergency Readiness Team (US CERT) late on Sunday, anyone using the Wi-Fi Protected Access II (WPA 2) protocol is probably compromised.

A serious flaw in the Wi-Fi network security protocol -- used in routers at home or office -- has left almost every user at risk of data hacking and privacy breach, the US government has warned. According to an advisory issued by the US Computer Emergency Readiness Team (US CERT) late on Sunday, anyone using the Wi-Fi Protected Access II (WPA 2) protocol is probably compromised. WPA2 has been used on all certified Wi-Fi hardware since 2006.

The WPA (which is now obsolete) and WPA2 standards were created by the Wi-Fi Alliance industry group that promotes interoperability and security for the wireless LAN industry. "US-CERT has become aware of several key management vulnerabilities in the four-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol," the advisory read. "The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others." "Note that as protocol-level issues, most or all correct implementations of the standard will be affected," it added. The Wi-Fi exploit is knows as "KRACK" -- short for Key Reinstallation Attacks.

According to The Guardian, security expert Mathy Vanhoef from Belgian university KU Leuven discovered the flaw in the wireless security protocol WPA2. "Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos and so on," Vanhoef was quoted as saying. The flaw affects operating systems and devices, including Android, Linux, Apple, Windows, MediaTek and others.

An arstechnica.com report said the vast majority of existing access points aren't likely to be patched quickly, and some may not be patched at all. "If initial reports are accurate that encryption bypass exploits are easy and reliable in the WPA2 protocol, it's likely attackers will be able to eavesdrop on nearby Wi-Fi traffic as it passes between computers and access points," the report added. People are being advised to use a wired Ethernet connection rather than Wi-Fi, wherever possible. They are also advised to stop logging into websites or URLs that don't start with HTTPS.

3 Reasons To Buy Apple iPhone 8 Plus and 2 Reasons To Skip It | Feat The Unbiased Blog

What's your reaction?

Comments

https://tupko.com/assets/images/user-avatar-s.jpg

0 comment

Write the first comment for this!