A security researcher from Belgium has discovered multiple bugs that affect the WiFi standard used by all device manufacturers, and therefore, possibly affect every WiFi device developed using these standards. The researcher has named these multiple bugs as FragAttacks (fragmentation and aggregation attacks).
What has been discovered?
According to the researcher, some of the bugs date back to 1997 and affect smartphones, computers, and other smart devices.
- If the attackers are at the radio range of the vulnerable WiFi-enabled devices, they could take over the device and intercept an owner’s information as it triggers malicious code.
- The researcher performed experiments on more than 75 devices, with every one of them vulnerable to at least one of the discovered attacks, signifying that every device is impacted.
- The vulnerabilities discovered in the design of WiFi standards are tracked as CVE-2020-24588, CVE-2020-24587, and CVE-2020-24586.
- In addition, another chunk of vulnerabilities were discovered in the way Wi-Fi standards are implemented, called implementation flaws.
Besides, the design flaws are not being exploited in the wild, experts said.
Many ways to exploit bugs
Attackers can intercept device owners’ details by exploiting implementation flaws.
- The implementation flaws (CVE-2020-26145 and CVE-2020-26144, among others) can be exploited by injecting frames into a protected WiFi network. In particular, an attacker can inject an unencrypted WiFi frame with a specially crafted frame.
- These vulnerabilities are linked to the process where WiFi standard breaks and reassembles network packets, which could allow attackers to steal data by injecting malicious code during the operation.
- Further, the flaws can be abused to compromise routers by bypassing the NAT or firewall, allowing the attackers to target vulnerable devices’ in the local WiFi network.
To prevent exploitation of these vulnerabilities, the researcher has suggested some general recommendations such as frequently updating IoT/smart devices, avoiding the reuse of passwords, and backing up important data. Moreover, users are recommended to manually configure the DNS server to stop poisoning attacks and make sure that the website uses HTTPS.