WPA3 Wi-Fi Standard Affected by New Dragonblood Vulnerabilities
#1
Quote:Security researchers discovered new vulnerabilities in the WPA3-Personal protocol which allow potential attackers to crack Wi-Fi network passwords and get access to the encrypted network traffic exchanged between the connected devices.
 
According to a press release from the Wi-Fi Alliance, the devices impacted by these security vulnerabilities in the WPA3 Wi-Fi standard "allow collection of side channel information on a device running an attacker’s software, do not properly implement certain cryptographic operations, or use unsuitable cryptographic elements."
 
WPA3 uses Wi-Fi Device Provisioning Protocol (DPP) instead of shared passwords to sign up new devices to the network, a protocol which allows users to scan QR codes or NFC tags to log devices onto the wireless network. Additionally, unlike WPA2, all network traffic will be encrypted after connecting to a network which uses WPA3 WiFi Security.
 
The WPA3-Personal protocol replaces the Pre-shared Key (PSK) in WPA2-Personal with Simultaneous Authentication of Equals (SAE) to provide more robust password-based authentication.

SOURCE: https://www.bleepingcomputer.com/news/se...abilities/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Messages In This Thread
WPA3 Wi-Fi Standard Affected by New Dragonblood Vulnerabilities - by silversurfer - 11 April 19, 13:26

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Linux 7.0 merges AMDGPU update for decad...
All thanks to Valv...harlan4096 — 17:55
AdGuard for iOS v4.5.16
AdGuard for iOS v4...harlan4096 — 07:24
QOwnNotes
26.2.9  Fixed a v...Kool — 05:38
AdGuard for Android 4.12.3
AdGuard for Androi...harlan4096 — 17:18
Replit Pro – One Month Free
Replit Pro     C...hanso — 17:02

[-]
Birthdays
Today's Birthdays
avatar (46)dimaWeami
Upcoming Birthdays
avatar (44)Baihu

[-]
Online Staff
There are no staff members currently online.

>