I found some design and implementation flaws in Wi-Fi again. All Wi-Fi devices are affected. It was a long ~9 months embargo, over this time a lot of info has been collected and that info now available at fragattacks.com
The findings consist of three design flaws and several widespread implementations flaws. Some of the flaws have been part of Wi-Fi since 1997! Full details are in my paper: papers.mathyvanhoef.com/usenix2021.pdf
I'd like to thank everyone who was involved in this coordinated disclosure! It was a long process and I'm glad this work is now over :)
With that news out of the way: later this year I'll be starting as a professor at @KU_Leuven Exciting times ahead!
One design flaw can be used to inject packets towards clients. Makes it possible to force victim to use malicious DNS server.
Some implementation flaws can be abused to inject packets towards an AP. Can be abused to punch a hole in the router's NAT and attack local devices.
The impact of the attacks really depends on the device. Sometimes the impact is very minor and there's nothing to worry about. Sometimes the impact is serious.
As always though: update your devices, we never know when attacks will improve. Check with your vendor to know the current practical impact for your device.
Also check out It's test tool with 45+ test cases, a live USB image, can test both APs and clients, both home and enterprise networks, supports multiple network cards, and contains references to slides and other overview info :)github.com/vanhoefm/fraga…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
New #TunnelCrack flaw can break a large majority of VPNs: we can trick a VPN into leaking traffic outside the protected VPN tunnel. Our tests indicate that this is a widespread design issue. For a demo, more details, and the USENIX Security paper, see tunnelcrack.mathyvanhoef.com
tl;dr: 1) VPNs allow direct access to local network. Abuse by assigning public IPs to local network, causing Internet traffic to leak. 2) VPNs add a rule not to (re-)encrypt traffic to VPN server itself. Abuse by spoofing IP of VPN server. Traffic to this IP is now leaked.
The reaction to this on reddit's /r/netsec is wild. According to them, this is a known issue.
Meanwhile, the issue was acknowledged as valid and new by OpenVPN, Mozzila, Cloudflare, F-Secure, Malwarebytes, Ivanti, AVG, AVAST, ExpressVPN, Windscribe, Samsung, Huawei, PureVPN,...