Security16.10.2017

KRACK Wi-Fi hack “devastating” to Android and Linux

KRACK logo

A new vulnerability in the Wi-Fi Protected Access II (WPA2) protocol has been detailed.

Discovered by Mathy Vanhoef of imec-DistriNet, the vulnerability is concerning, and if your device supports Wi-Fi, it may be affected.

“The weaknesses are in the Wi-Fi standard, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected,” said Vanhoef.

“Users must update affected products as soon as security updates become available. We discovered that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others are all affected by some variant of the attacks.”

Vanhoef said attackers in range of the same Wi-Fi network as you could exploit the vulnerability to steal sensitive information.

Depending on the network configuration, it is also possible to inject malware and manipulate data.

Android and Linux

The attack is “exceptionally devastating” against Linux and Android 6.0 or higher, said Vanhoef.

This is because Android and Linux use the same Wi-Fi client software, known as wpa_supplicant. Versions 2.4 and above of the software can be tricked into installing an all-zero encryption key.

“This vulnerability appears to be caused by a remark in the Wi-Fi standard that suggests to clear the encryption key from memory once it has been installed for the first time.”

“When the client now receives a retransmitted message 3 of the 4-way handshake, it will reinstall the now-cleared encryption key, effectively installing an all-zero key.”

Vanhoef said his proof-of-concept attacks do not recover the password of the Wi-Fi network, nor do they recover any parts of the fresh encryption key that is negotiated during the 4-way handshake.

MikroTik routers fixed

Ubiquity said it has a patch in beta for its routers, while MikroTik said its RouterOS v6.39.3, v6.40.4, and v6.41rc are not affected.

“All implemented fixes refer only to station and [Wireless Distribution System] modes. Devices running on AP mode are not affected,” said MikroTik.

MikroTik said not all of the discovered vulnerabilities impact RouterOS, but added that it followed all recommendations and improved the key exchange process according to the guidelines it received from the security researcher.

“We released fixed versions last week, so if you upgrade your devices routinely, no further action is required,” said MikroTik.

Now read: Turning off Wi-Fi and Bluetooth in iOS 11 is not what it seems

Show comments

Latest news

More news

Trending news

Sign up to the MyBroadband newsletter