I found some design and implementation flaws in Wi-Fi again. All Wi-Fi devices are affected. It was a long ~9 months embargo, over this time a lot of info has been collected and that info now available at fragattacks.com
The findings consist of three design flaws and several widespread implementations flaws. Some of the flaws have been part of Wi-Fi since 1997! Full details are in my paper: papers.mathyvanhoef.com/usenix2021.pdf
I'd like to thank everyone who was involved in this coordinated disclosure! It was a long process and I'm glad this work is now over :)
With that news out of the way: later this year I'll be starting as a professor at @KU_Leuven Exciting times ahead!
One design flaw can be used to inject packets towards clients. Makes it possible to force victim to use malicious DNS server.
Some implementation flaws can be abused to inject packets towards an AP. Can be abused to punch a hole in the router's NAT and attack local devices.
The impact of the attacks really depends on the device. Sometimes the impact is very minor and there's nothing to worry about. Sometimes the impact is serious.
As always though: update your devices, we never know when attacks will improve. Check with your vendor to know the current practical impact for your device.
Also check out It's test tool with 45+ test cases, a live USB image, can test both APs and clients, both home and enterprise networks, supports multiple network cards, and contains references to slides and other overview info :)github.com/vanhoefm/fraga…
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.
