A vulnerability might allow cyber criminals to intercept data being transmitted between Wi-Fi access points and endpoints, recent research has uncovered. The vulnerability, known as KRACK, short for Key Reinstallation Attacks, affects WPA2, which is widely used by many Wi-Fi enabled devices and can be used to inject malware or ransomware into websites.
So, WPA2 is crackable. This is bad for a number of reasons:
1 – Almost Everyone in the U.S. is Vulnerable: Most home users moved from WEP (the previous standard that was deemed insecure) to WPA2, which makes almost everyone in the U.S. who uses a home router vulnerable. Most companies stopped at WPA2 and did not include things such as Active Directory authentication or multi-factor authentications for wireless access. Unfortunately, WPA2 was deemed “good enough” for most.
2 – If Your Device Supports WPA2, it is Likely Vulnerable: HINT: almost everything does these days – mobile devices, IoT, laptops, desktops, etc. The scope is vast.
3 – It’s Likely the Vulnerability Will Be Exploited in the Wild Very Soon – Code has not been released yet, but you can bet people are already reversing the flaw. This will lead to a myriad of tools to pull off this attack. As of yet, the vulnerability cannot be exploited in the wild, but my guess is this will happen very soon.
4 – Attackers Have the Ability to Control Traffic – Details of this vulnerability are very technical, but the attack essentially uses an impersonated user who was previously authenticated. An attacker tricks the user into reinstalling the crypto key (it is supposed to be random and each authentication request gets a new random one). By doing this, attackers can control traffic however they wish.
What Are the Ramifications of This Vulnerability?
You can bet this will end up in Kali Linux and Metasploit quickly and we will all be using this to add an additional “flag” when penetration tests are conducted.
Think of this as a skeleton key for wireless communications. Every pen-test for at least six months will have this as a finding.
Much like the blog we wrote in May about routers and switches, this is similar. Attackers perform traffic-injection techniques (return fake data or other nefarious things) or simply watch all the traffic and don’t have to hack passwords or usernames. After this, attackers can look to do traffic or route injection to send people to whatever fake website they wish.
Communication security is in a dangerous place. The good news is I’ve spoken to a lot of security professionals leading projects to address communication flaws. The bad news is that multiple vendors are affected, so patching could take a long time. You can be sure attackers will leverage that delta in patching. Communication and router security has been ignored for too long.
After all if you can’t trust your traffic, what can you trust?