Kr00k Vulnerability Shreds WiFi

By Chris Bonatti, IECA of Casper Wyoming; Comments in blue by CyberWyoming

Researchers at ESET Security have discovered a new vulnerability and attack that cuts through WiFi Protected Access 2 (WPA2) like a hot knife through butter.

Definition: WPA2 is the standard WiFi encryption protocol that most wireless routers use.

The new vulnerability, which is an extension of the old Key Re-installation Attack (KRACK), has been dubbed Kr00k. The Kr00k vulnerability affects any unpatched (unpatched means that it needs a software update – yes, routers get these too, but people call them firmware updates) device that contains the most popular WiFi chips in the industry, which are those manufactured by Broadcom and Cypress. The vulnerability occurs as a side effect of an integration issue in the handling of 802.11 WiFi connection management disassociate packets, and failure to properly reset the state of the chipset. It is estimated that Kr00k affects more than a BILLION devices including both user devices and access points or routers.

Because Kr00k is fundamentally a firmware level problem, there is no easy workaround for the vulnerability. A firmware update is possible, and many
companies are promising patches for their products. However, the bad news is that many devices will never be updated, and will forever remain vulnerable to this
readily exploitable flaw.

The moral of this story: Watch for a firmware update for your wireless router soon and be sure to install it. Check your router’s manufacturer’s website to see if a new one comes you.

YouTube player

This is just one article from Chris Bonatti’s IECA newsletter. For the full IECA newsletter, check it out at http://www.ieca.com/newsletter/2004-IECA_Cyber_Bulletin.pdf

Share:

Register to Receive the Tech Joke of the Week!

This Week's Joke:

How many programmers does it take to change a light bulb?

None, it is a hardware problem!

More Posts: