Researchers out of KU Leuven recently disclosed a major vulnerability in the WPA2 protocol. The attack, known as KRACK, works by forcing the victim to reinstall an already-used key. By replaying message 3 in the WPA2 four-way handshake, the attacker can make the victim reuse nonces and receive replay counters. With this known key, and if the attacker knows the plaintext being sent, it becomes trivial to decrypt WPA2 traffic. Mathy Vanhoef, the lead researcher on this project, has confirmed that this flaw exists in the WPA2 protocol itself; this means that all vendors, all implementations, and all operating systems are affected by this attack. Vanhoef goes into much more detail on the theory and potential impact on his site, KRACK Attacks.
As a POC, Vanhoef released a video executing the attack on an Android phone.
Since Vanhoef released this flaw so recently, vendors are rushing to push out implementation-specific patches for their equipment. Aruba, Ubiquiti, and Eero confirmed they already released patches, and Apple, Samsung, Amazon, and Google, among others, have patches in the works. In the meantime, what can you do to protect yourself?
Secure Compliance Solutions LLC (SCS) provides a wide range of CISO advisory consulting and managed security services to small- and medium-sized businesses. We help our clients navigate the increasingly complex world of cybersecurity, from advising executives on long-term cybersecurity objectives to training analysts and engineers on emerging trends and threats. With industry experts in cybersecurity policy and regulations, compliance, and system hardening and monitoring, SCS can help businesses address any cyber threats out there today, whether small or large, internal or external. We champion a strategy of readiness and resilience. No matter the threat, SCS can and will protect against it. Contact us today.