The Internet has been blowing up in the past week about the KRACK WPA2 attack that is extremely widespread and is a flaw in the Wi-Fi standard itself, not the implementation. It’s a flaw in the 4 way handshake for WP2 compromised by a Key Reinstallation Attack.
This means any device that has correctly implemented WPA2 is likely affected (so basically everything that has Wi-Fi capability) – this includes Android, Linux, Apple, Windows, OpenBSD and more.
Android 6 is especially vulnerable to this, and be aware the flaw is on both sides (client and access point) and both need to be patched.
An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.
The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected.
If you’re using a router that supports an alternative OS like DD-WRT, LEDE/OpenWRT or something open like MikroTik – they already have patches available.
We are using Ubiquiti gear and they came out with the patches super fast, we do have some Ruckus gear and they have an interesting post about it if you’re using the Mesh type network you’re pretty safe.
Which is good news since the last time we wrote about them, it wasn’t great – Ubiquiti Wi-Fi Gear Hackable Via 1997 PHP Version.
There’s a great list of what has been patched against KRACK WPA2 attack and what hasn’t here (regularly updated):
It kinda feels like the time when we all ran to abandon WEP for WPA2, but it’s not that straightforward and also it can be patched in a backwards compatible manner – which is fortunate.
The unfortunate part is all the devices that are NOT going to get patched (especially IoT devices, security cams, embedded systems etc).
The challenges also go beyond the mere availability of a patch. Take Netgear. To its credit, the company made fixes available for a dozen of its router models the day that Krack went public. But it makes over 1200 products, each of which needs to be tested for specific Krack impact. In many cases, Netgear also can’t make those fixes alone; it needs its chipset partners to tackle the issue as well.
And when those patches do become available, the company has limited ways to inform customers they need to update as soon as possible. It sends emails to those who register their products, and sends out an advisory, and posts in community forums. The remainder of Netgear customers—the bulk of them—will have to read a news report like this one, and hunt down the right download link to install the fix. And even if they do that, the actual patching process requires logging into Netgear’s access point web-management interface from your computer, which may rightly baffle a number of router owners.
“I wouldn’t claim that anyone can just do it,” says Netgear CIO Tejas Shah. “We recognize the need to educate the customer and help the customer when they’re faced with this problem.”
Those issues aren’t unique to Netgear, which, again, gets a star for making patches immediately available. But they do underscore just how ill-prepared wireless devices are for this kind of industry-wide calamity.
And that’s just routers, which people by and large are at least aware connect to the internet. IoT devices are a whole extra level of opaque.
For the average user, they aren’t going to know what WPA2 is and that their fridge is using it to communicate to the Internet for patches and that’s it’s now vulnerable to the KRACK WPA2 Wi-Fi Attack.
And using SSL does help, but it doesn’t really stop KRACK being a serious issue.
For the moment it seems the code needed to execute the attack isn’t in the wild, and probably won’t be. But honestly, it won’t take long for the bad guys to get hold of the patches that fix the issue, reverse engineer them and figure out how to code an exploit around the flaw.
Patch your devices as soon as the fix comes out, and try and educate those around you as best you can. I’m not sure if this will turn into something serious or not yet, as it’s a pretty technical attack.
It’s also a very scary attack as the malicious actor doesn’t even need to join the network, they just need to be in signal range.
We will have to wait and see if this blows up, or just blows over like most things.
Source : DarkNet