This time the fault is in with the Wi-Fi securities. Recently, the researchers have revealed details of a new exploit, termed as KRACK, that takes advantages of the Wi-Fi securities, enabling the attackers to eavesdrop on the traffic between computers and wireless access points. Further, the exploit takes huge advantage of several key management vulnerabilities in the WPA2 security protocol, and the prominent authentication scheme used to protect personal and enterprise Wi-Fi networks. As per the researchers, “If your device supports Wi-Fi, it is most likely affected”.
In reference to this exploit, the United States Computer Emergency Readiness Team issued the following warning:
US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven will be publicly disclosing these vulnerabilities on 16 October 2017.
Also, the researchers have further found out that, around 41 percent of all the Android devices are vulnerable to an “exceptionally devastating” variant of the Wi-Fi attack. All Wi-Fi devices are more or less susceptible to a certain degree to the vulnerabilities, making them ripe for data theft or ransomware code injection from any malicious attacker within range. The researchers recommend patching all Wi-Fi clients and access points when the fixes are available and to continue using WPA2 until then (WPA1 is also affected and WEP security is even worse). It’s not yet clear if the vulnerabilities revealed today are actively being exploited in the wild.