Dragonblood vulnerabilities disclosed in WiFi WPA3 standard

Discussion in 'other security issues & news' started by guest, Apr 10, 2019.

  1. guest

    guest Guest

    Dragonblood vulnerabilities disclosed in WiFi WPA3 standard
    Dragonblood vulnerability discovered by the same security researcher who discovered the KRACK attack on WPA2
    April 10, 2019

    https://www.zdnet.com/article/dragonblood-vulnerabilities-disclosed-in-wifi-wpa3-standard/
     
  2. guest

    guest Guest

    WPA3 Wi-Fi no more secure than WPA2, researchers claim
    April 11, 2019
    https://appleinsider.com/articles/19/04/11/wpa3-wi-fi-no-more-secure-than-wpa2-researchers-claim
     
  3. guest

    guest Guest

    New Dragonblood vulnerabilities found in WiFi WPA3 standard
    Two new Dragonblood bugs allow attackers to recover passwords from WPA3 WiFi networks
    August 3, 2019
    https://www.zdnet.com/article/new-dragonblood-vulnerabilities-found-in-wifi-wpa3-standard/
     
  4. guest

    guest Guest

    Recovering Wi-Fi Password via Dragonblood Attack Costs $1 of Computing Power
    August 6, 2019
    https://www.securityweek.com/recovering-wi-fi-password-dragonblood-attack-costs-1-computing-power
     
  5. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,873
    Location:
    Outer space
    The researcher, Vanhoef confirmed that the side channel attacks are fixed with Hash-to-Element:
    https://twitter.com/vanhoefm/status/1410134225743921154?s=21

    I found this and also another security feature:

    https://community.synology.com/enu/forum/2/post/143390
    (Link to forum post as the WiFi Alliance page does not seem to be publicly available.

    Note that Windows is just adding Hash-to-Element in the upcoming Windows 10 21H2, so it may take a while before both clients and routers support it. Not sure if an OS update is enough or new WiFi drivers are also needed.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.