Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday February 28 2020, @05:41PM   Printer-friendly
from the encrypted-for-some-values-of-encryption dept.

https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/

Billions of devices—many of them already patched—are affected by a Wi-Fi vulnerability that allows nearby attackers to decrypt sensitive data sent over the air, researchers said on Wednesday at the RSA security conference.

[...]Eset researchers wrote in a research paper published on Wednesday. "The attack surface is greatly increased, since an adversary can decrypt data that was transmitted by a vulnerable access point to a specific client (which may or may not be vulnerable itself)."

[...]Kr00k exploits a weakness that occurs when wireless devices disassociate from a wireless access point. If either the end-user device or the access point is vulnerable, it will put any unsent data frames into a transmit buffer and then send them over the air. Rather than encrypt this data with the session key negotiated earlier and used during the normal connection, vulnerable devices use a key consisting of all zeros, a move that makes decryption trivial.

[...]Eset researchers determined that a variety of devices are vulnerable, including:

  • Amazon Echo 2nd gen
  • Amazon Kindle 8th gen
  • Apple iPad mini 2
  • Apple iPhone 6, 6S, 8, XR
  • Apple MacBook Air Retina 13-inch 2018
  • Google Nexus 5
  • Google Nexus 6
  • Google Nexus 6S
  • Raspberry Pi 3
  • Samsung Galaxy S4 GT-I9505
  • Samsung Galaxy S8
  • Xiaomi Redmi 3S

The researchers also found that the following wireless routers are vulnerable:

  • Asus RT-N12
  • Huawei B612S-25d
  • Huawei EchoLife HG8245H
  • Huawei E5577Cs-321

An Apple spokesman said the vulnerabilities were patched last October with details for macOS here and for iOS and iPadOS here.

[...]While the vulnerability is interesting and users should make sure their devices are patched quickly—if they aren't already—there are a few things that minimize the real-world threat posed.

[...]Despite the limited threat posed, readers should ensure their devices have received updates issued by the manufacturers. This advice is most important for users of vulnerable Wi-Fi routers, since routers are often hard to patch and because vulnerable routers leave communications open to interception even when client devices are unaffected or are already patched.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 2) by barbara hudson on Friday February 28 2020, @05:51PM (6 children)

    by barbara hudson (6443) <barbara.Jane.hudson@icloud.com> on Friday February 28 2020, @05:51PM (#964212) Journal

    So what if someone else can get a few data packets from the devices that are spying on your all the time. Instead of 200 (advertisers, government agencies, etc) it's now 201.

    --
    SoylentNews is social media. Says so right in the slogan. Soylentnews is people, not tech.
    • (Score: 0) by Anonymous Coward on Friday February 28 2020, @08:06PM (5 children)

      by Anonymous Coward on Friday February 28 2020, @08:06PM (#964305)

      Sniffing enough wifi packets that you could get the login credentials. I thought this was well known over 10 years ago.

      • (Score: 2) by NickM on Friday February 28 2020, @09:33PM (4 children)

        by NickM (2867) on Friday February 28 2020, @09:33PM (#964345) Journal
        You must be extremely lucky to catch one interesting packet that was sent to the AP before the device deassociation event but transmitted after it.
        --
        I a master of typographic, grammatical and miscellaneous errors !
        • (Score: 2) by NickM on Friday February 28 2020, @09:39PM (2 children)

          by NickM (2867) on Friday February 28 2020, @09:39PM (#964351) Journal
          Nevermind! I read the whole paper and device deassociation frame are sent in unauthenticated clear text, it implies that an attacker can exploit this at will !
          --
          I a master of typographic, grammatical and miscellaneous errors !
          • (Score: 2) by barbara hudson on Saturday February 29 2020, @03:47AM (1 child)

            by barbara hudson (6443) <barbara.Jane.hudson@icloud.com> on Saturday February 29 2020, @03:47AM (#964501) Journal
            Still doesn't matter. It's wifi - so it's not like it's a network attack that someone a mile away or on the other side of the world could do. And I doubt any of your neighbours give a shit about anything beyond their own interests anyway. Just dump the home spying network devices. Problem solved. Or is everyone so fat and lazy they can't even turn their own lights off any more?
            --
            SoylentNews is social media. Says so right in the slogan. Soylentnews is people, not tech.
            • (Score: 3, Insightful) by NickM on Sunday March 01 2020, @04:17PM

              by NickM (2867) on Sunday March 01 2020, @04:17PM (#964939) Journal

              At home, I concede that this is not that scary but in a corporate settings this technique gives an attacker the potential to harvest a lots of juicy credentials since almost the all the suits use laptops, they are assuredly wirelessly connected when they are in a meeting room and since they are suits they are almost always in a meeting of some sorts.

              News like this, makes me glad that I don't work in the IT security administrative unit .

              --
              I a master of typographic, grammatical and miscellaneous errors !
        • (Score: 3, Informative) by TheGratefulNet on Friday February 28 2020, @11:37PM

          by TheGratefulNet (659) on Friday February 28 2020, @11:37PM (#964401)

          pwnagotchi

          google it.

          --
          "It is now safe to switch off your computer."
  • (Score: 1, Informative) by Anonymous Coward on Friday February 28 2020, @05:59PM (2 children)

    by Anonymous Coward on Friday February 28 2020, @05:59PM (#964222)

    The same day, by the same author:
    https://soylentnews.org/article.pl?sid=20/02/28/0327222 [soylentnews.org]

    • (Score: 2) by janrinok on Saturday February 29 2020, @10:16AM (1 child)

      by janrinok (52) on Saturday February 29 2020, @10:16AM (#964559) Journal

      Not sure how that can have happened - once an editor processes the story then it is removed from all other queues. My only guess is that Freeman submitted the same story twice - why? I have no idea.

      It might surprise you but when we are busy editing stories for the front page we do not get much time to read the stories that other editors are working on. I often edit during the day but I don't get time to read the full front page until that evening or the following day.

      • (Score: 2) by Freeman on Monday March 02 2020, @05:36PM

        by Freeman (732) on Monday March 02 2020, @05:36PM (#965562) Journal

        I'm sorry, if I did. Been sick, so crazy things could have happened.

        --
        Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"
  • (Score: 0) by Anonymous Coward on Friday February 28 2020, @06:20PM (5 children)

    by Anonymous Coward on Friday February 28 2020, @06:20PM (#964238)

    Wow. I only have one of the devices on that list. I would have expected it to be higher. I guess deciding to skip the Pi3 and wait for to upgrade to a Pi4 was the right decision.

    • (Score: 4, Insightful) by takyon on Friday February 28 2020, @06:22PM (2 children)

      by takyon (881) <{takyon} {at} {soylentnews.org}> on Friday February 28 2020, @06:22PM (#964240) Journal

      Is that list exhaustive or just a list of the devices the researchers had on hand?

      --
      [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
      • (Score: 3, Informative) by NotSanguine on Friday February 28 2020, @06:44PM

        by NotSanguine (285) <NotSanguineNO@SPAMSoylentNews.Org> on Friday February 28 2020, @06:44PM (#964264) Homepage Journal

        Check the comment [soylentnews.org] I posted in the last iteration of this story. There's a link to the CVE with more details about affected software/firmware versions and configs.

        HTHAL.

        --
        No, no, you're not thinking; you're just being logical. --Niels Bohr
      • (Score: 2) by janrinok on Saturday February 29 2020, @10:18AM

        by janrinok (52) on Saturday February 29 2020, @10:18AM (#964560) Journal

        that a variety of devices are vulnerable, including ....

        Definitely not exhaustive.

    • (Score: 2) by hendrikboom on Sunday March 01 2020, @08:19PM (1 child)

      by hendrikboom (1125) on Sunday March 01 2020, @08:19PM (#965059) Homepage Journal

      I dumped my Nexus 5 recently -- apparently just in time. I have been unable to upgrade it for years, and every day it reports on a failed upgrade attempt.

      My new phone is also a bit old, but at least it doesn't complain about repeated failed upgrades. I hope it *is* doing security upgrades.

      -- hendrik

      • (Score: 2) by Freeman on Monday March 02 2020, @05:46PM

        by Freeman (732) on Monday March 02 2020, @05:46PM (#965564) Journal

        I hope it *is* doing security upgrades.

        -- hendrik

        Yeah, if you're hoping it is, and it's more than 2 years old. You're likely not getting those.

        Google has long struggled with how best to get dozens of Android smartphone manufacturers—and hundreds of carriers—to regularly push out security-focused software updates. But when one German security firm looked under the hood of hundreds of Android phones, it found a troubling new wrinkle: Not only do many Android phone vendors fail to make patches available to their users, or delay their release for months; they sometimes also tell users their phone's firmware is fully up to date, even while they've secretly skipped patches.

        https://www.wired.com/story/android-phones-hide-missed-security-updates-from-you/ [wired.com]

        You're not even very likely to be getting any anyway. Unless, you have a phone that is part of Android One. There's some enterprise recommendation thing as well, and those phones are likely to be updated more consistently. Unless I was reading old info and the Android One thing replaced it.

        --
        Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"
  • (Score: 2) by corey on Friday February 28 2020, @09:23PM

    by corey (2202) on Friday February 28 2020, @09:23PM (#964340)

    So l33t.
    Takes me back to 2000.

(1)