Wi-Fi Vulnerability Leads to FragAttacks Attacks
Belgian security researcher Mathy Vanhoef found 12 critical security flaws, which attackers exploited to perform a fragmentation and aggregation attack known as FragAttacks.
Among the errors raised, there are errors that stem from wifi standards dating back to 1997, the rest are common programming errors. Tests show that every wifi product today is affected by at least one vulnerability.
FragAttacks are said to be particularly dangerous because they can allow attackers to gather information about the owner of a Wi-Fi enabled device and run malicious code to compromise the device even with security protocols enabled. WEP or WPA. However, attackers are required to be within range of the device because the FragAttacks attack mechanism cannot be performed remotely.
This is not the first time Vanhoef has found vulnerabilities in wifi devices, he has previously discovered 2 vulnerabilities KRACK and Dragonblood. These two vulnerabilities were reported to the wifi Alliance, which then worked with wifi providers to update these bugs.
Microsoft released updates to patch 3 out of 12 security flaws in March 2021. Several major technology companies such as Cisco Systems, HPE/Aruba Networks, Juniper Networks or Sierra Wireless have published security updates and advice on FragAttacks.
To protect you from FragAttacks, the Wifi Alliance recommends that users of Wi-Fi enabled devices install the latest recommended updates from device manufacturers. Doing this enables suspicious traffic to be detected or improves compliance with recommended security implementations.
You should read it
- What are FragAttacks? how to protect your WiFi device from FragAttacks
- All Wifi Devices Can Be Attacked by FragAttacks Vulnerabilities
- What is 51% attack? How does 51% attack work?
- What is a Replay Attack?
- What is Volumetric DDoS Attack?
- What is SS7 attack? What can hackers use it for?
- Analysis of an attack (Part 3)
- What is BlueSmack attack?
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- What is Teardrop attack?
- What is a Sybil Attack?
- Phishing attack: The most common techniques used to attack your PC
Maybe you are interested
7 must-have features on a WiFi router
What is Mesh WiFi? How does Mesh WiFi work?
How to fix wifi error of not being able to access the network and the causes
5 best WiFi routers in 2024
How to block wifi users, see who is using temple wifi and disconnect
12 How to change Wifi password, change Wifi Pass on computer and phone