backtop


Print 47 comment(s) - last by althaz.. on Jan 3 at 4:41 AM

The Department of Homeland Security suggests the only solution is to disable WPS

NETGEAR, Inc. (NTGR), Cisco System, Inc.'s (CSCO) Linksys, D-Link Corp (TPE:2332), and Belkin, Inc. are some of the biggest makers of routers.  If you own a router, there's a good chance you own a router from one of these manufacturers.  And if you own a router from them, there's a good chance you used Wi-Fi Protected Setup (WPS) -- a PIN protected method -- to easily set up your home network.  And that means that there's a good chance your security is now at serious risk.

WPS was dreamed up by the Wi-Fi Alliance as a means of easing the pain of home networking.  But by including a flag in the EAP-NACK message, the standard unwittingly left a gaping hole that can be exploited by hackers to subvert your router.

The message tells the user if the first half of the pin they typed was right.  Thus it drastically reduces the time needed to crack the PIN using a brute force attack.  Add in that the last bit of the PIN is always its checksum, you have a recipe for a security disaster.

Linksys router
[Image Source: Best Wireless Internet Routers Blog]

The flaw reduces the time it takes to crack your average PIN from 108 attempts to 104+103 attempts (11,000 attempts total).  Assuming you can fire off ten requests or more a second, you should be able to crack routers in minutes.

The U.S. Department of Homeland Security (DHS) has issued a warning to the public about the flaw.  It advises disabling WPS.  This may be a painful option for less savvy operators, though, as setting up a network with more sophisticated protections can require a bit of learning.

Stefan Viehbock discovered the vulnerability and reported it to the DHS.  He claims that none of the major manufacturers stepped up to the plate with a patch.  He is going to release a C-coded exploitation tool shortly -- perhaps that will help prompt the business into action.

Sources: .BrainDump (Stefan Viehbock), Department of Homeland Security



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Valid assumption?
By nafhan on 12/29/2011 1:28:50 PM , Rating: 2
quote:
Assuming you can fire off ten requests or more a second, you should be able to crack routers in minutes.
Is that a valid assumption? If that time goes up to say, 3 attempts per minute, (depending on the router, that may be more reasonable) it would take 2.5 days to crack this.
Either way, it's a pretty big flaw.




RE: Valid assumption?
By Labotomizer on 12/29/11, Rating: -1
RE: Valid assumption?
By winie on 12/29/2011 1:48:52 PM , Rating: 3
The limiting factor is how many requests the router can answer not your pc


RE: Valid assumption?
By nafhan on 12/29/2011 4:49:08 PM , Rating: 2
Have you ever logged into a router before? You are not going to be able to do that 60,000 times a second. Those kind of speeds are generally only possible if you've got the entire password database stored locally on the machine doing the cracking - not applicable in this situation.


"We are going to continue to work with them to make sure they understand the reality of the Internet.  A lot of these people don't have Ph.Ds, and they don't have a degree in computer science." -- RIM co-CEO Michael Lazaridis

Related Articles













botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki