Mathy Vanhoef Profile picture
May 11, 2021 8 tweets 2 min read Read on X
I found some design and implementation flaws in Wi-Fi again. All Wi-Fi devices are affected. It was a long ~9 months embargo, over this time a lot of info has been collected and that info now available at fragattacks.com
The findings consist of three design flaws and several widespread implementations flaws. Some of the flaws have been part of Wi-Fi since 1997! Full details are in my paper: papers.mathyvanhoef.com/usenix2021.pdf
I'd like to thank everyone who was involved in this coordinated disclosure! It was a long process and I'm glad this work is now over :)
With that news out of the way: later this year I'll be starting as a professor at @KU_Leuven Exciting times ahead!
One design flaw can be used to inject packets towards clients. Makes it possible to force victim to use malicious DNS server.

Some implementation flaws can be abused to inject packets towards an AP. Can be abused to punch a hole in the router's NAT and attack local devices.
The impact of the attacks really depends on the device. Sometimes the impact is very minor and there's nothing to worry about. Sometimes the impact is serious.
As always though: update your devices, we never know when attacks will improve. Check with your vendor to know the current practical impact for your device.
Also check out It's test tool with 45+ test cases, a live USB image, can test both APs and clients, both home and enterprise networks, supports multiple network cards, and contains references to slides and other overview info :)github.com/vanhoefm/fraga…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Mathy Vanhoef

Mathy Vanhoef Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @vanhoefm

Aug 8, 2023
New #TunnelCrack flaw can break a large majority of VPNs: we can trick a VPN into leaking traffic outside the protected VPN tunnel. Our tests indicate that this is a widespread design issue. For a demo, more details, and the USENIX Security paper, see tunnelcrack.mathyvanhoef.com
tl;dr: 1) VPNs allow direct access to local network. Abuse by assigning public IPs to local network, causing Internet traffic to leak.
2) VPNs add a rule not to (re-)encrypt traffic to VPN server itself. Abuse by spoofing IP of VPN server. Traffic to this IP is now leaked.
The reaction to this on reddit's /r/netsec is wild. According to them, this is a known issue.

Meanwhile, the issue was acknowledged as valid and new by OpenVPN, Mozzila, Cloudflare, F-Secure, Malwarebytes, Ivanti, AVG, AVAST, ExpressVPN, Windscribe, Samsung, Huawei, PureVPN,...
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(