Wi-Fi Vulnerability Leads to FragAttacks Attacks
Belgian security researcher Mathy Vanhoef found 12 critical security flaws, which attackers exploited to perform a fragmentation and aggregation attack known as FragAttacks.
Among the errors raised, there are errors that stem from wifi standards dating back to 1997, the rest are common programming errors. Tests show that every wifi product today is affected by at least one vulnerability.
FragAttacks are said to be particularly dangerous because they can allow attackers to gather information about the owner of a Wi-Fi enabled device and run malicious code to compromise the device even with security protocols enabled. WEP or WPA. However, attackers are required to be within range of the device because the FragAttacks attack mechanism cannot be performed remotely.
This is not the first time Vanhoef has found vulnerabilities in wifi devices, he has previously discovered 2 vulnerabilities KRACK and Dragonblood. These two vulnerabilities were reported to the wifi Alliance, which then worked with wifi providers to update these bugs.
Microsoft released updates to patch 3 out of 12 security flaws in March 2021. Several major technology companies such as Cisco Systems, HPE/Aruba Networks, Juniper Networks or Sierra Wireless have published security updates and advice on FragAttacks.
To protect you from FragAttacks, the Wifi Alliance recommends that users of Wi-Fi enabled devices install the latest recommended updates from device manufacturers. Doing this enables suspicious traffic to be detected or improves compliance with recommended security implementations.
You should read it
- What are FragAttacks? how to protect your WiFi device from FragAttacks
- All Wifi Devices Can Be Attacked by FragAttacks Vulnerabilities
- What is 51% attack? How does 51% attack work?
- What is a Replay Attack?
- What is Volumetric DDoS Attack?
- What is SS7 attack? What can hackers use it for?
- Analysis of an attack (Part 3)
- What is BlueSmack attack?
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- What is Teardrop attack?
- What is a Sybil Attack?
- Phishing attack: The most common techniques used to attack your PC
Maybe you are interested
Should I buy a tablet with 4G LTE/5G connectivity or just WiFi?
How to log in to Wifi Modem Router to change Wifi name and password
Fix computer error not finding Wifi network successfully
'Silent' Town: No Wifi, No Mobile Signals for Over 60 Years
How to Use WiFi Analyzer to Boost Your Wi-Fi Connection
7 must-have features on a WiFi router