WiFi security is revealed by researchers to be at risk from a form of replay attack that could leave hundreds of millions of devices vulnerable to attack.
The WPA2 protocol which is widely used to secure WiFi traffic is at risk from multiple vulnerabilities, collectively referred to as “KRACK Attacks” that were publicly disclosed on Oct. 16
“Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted,” the vulnerability disclosure warns.”The attack works against all modern protected Wi-Fi networks.”
KRACK is an acronym for K ey R einstallation A tta ck s, which were discovered by security research Mathy Vanhoef and Frank Piessens working at Belgian University KU Leuven. The researchers have disclosed the details of the KRACK attack in a research paper and plan on discussing it further in talks at the Computer and Communications Security (CCS) and Black Hat Europe conferences later this year.
In total, the KRACK Attacks include 10 different vulnerabilities, CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087 and CVE-2017-13088. The different CVE’s refer to variations of the key reinstallation attack that impact WPA2.
The KRACK vulnerabilities define new approaches to exploit the way that WPA2 generates a session encryption key. The researchesr note that all WPA2 protected WiFi networks use the 4-way handshake to generate a fresh session key.
“So far, this 14-year-old handshake has remained free from attacks, and is even proven secure,” the research abstract states. “However, we show that the 4-way handshake is vulnerable to a key reinstallation attack.”
The reinstallation attack is a form of replay attack, where an attacker tricks a victim into reinstalling an already-in-use key. The researchers explain that the way a KRACK attack works is by manipulating and replaying handshake messages. Of note, the researcher emphasizes that the KRACK attack methods do not actually reveal the password of a WPA2 protected WiFi network. Additionally the crack attacks do not recover any parts of a fresh encryption key that is negotiated during the 4-way handshake.
The potential impact of the KRACK vulnerabilities is large and could well involve all users of WP2 protected WiFi today.
“The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations,” Vanhoef wrote. “Therefore, any correct implementation of WPA2 is likely affected.”
At this point, Vanhoef noted that he has no indication that the KRACK vulnerabilities have been exploited in the wild by attacker, though he cautions that it is possible.
“We are not in a position to determine if this vulnerability has been (or is being) actively exploited in the wild,” Vanhoef wrote. “That said, key reinstallations can actually occur spontaneously without an adversary being present! This may for example happen if the last message of a handshake is lost due to background noise, causing a retransmission of the previous message.”
According to Vanhoef, Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and many other vendors are affected by some variant of the KRACK attacks. Vanhoef worked with CERT/CC to conduct a coordinated private disclosure that was sent out to impacted vendors on Aug. 28. Multiple vendors have already issued patches to fix the issues.
“Changing the password of your WiFi network does not prevent (or mitigate) the attack,” Vanhoef wrote. “Instead, you should make sure all your devices are updated, and you should also update the firmware of your router.”
Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.