US-CERT says Wi-Fi hole open to brute force attack

Dec 29, 2011 by Nancy Owano report

(PhysOrg.com) -- The US Computer Emergency Readiness Team (US-CERT) has issued a warning about a security hole in the Wi-Fi Protected Set-up protocol for Wi-Fi routers. Security researcher Stefan Viehbock discovered the vulnerability, reported it to the US-CERT, which then issued its public warning earlier this week. Viehbock was able to recognize design decisions about the protocol, which enables an efficient brute force attack.

The US-CERT warning said:

“The WiFi Protected Setup (WPS) PIN is susceptible to a brute force attack. A design flaw that exists in the WPS specification for the PIN authentication significantly reduces the time required to brute force the entire PIN because it allows an attacker to know when the first half of the 8 digit PIN is correct. The lack of a proper lock out policy after a certain number of failed attempts to guess the PIN on some wireless routers makes this brute force attack that much more feasible.”

The , introduced in 2007 by the Alliance, was intended to make life simple for setting up and configuring security on wireless local area networks, especially for home and small office-home (SOHO) environments. “Wi-Fi Protected Setup enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to easily configure new wireless networks, to add new devices and to enable security,” according to the WiFi Alliance white paper.

The simplification resides in the setup process where users only have to type in a shortened PIN instead of longer phrase if adding a new device to a network. By entering the wrong PIN, the hacker gets returned information that could be useful for an attack. The 8-digit PIN's security falls dramatically as more attempts are made. A message sent by the router when the PIN fails informs the hacker if the first four digits are correct; the last digit of the key is used as a checksum and is given out by the router in negotiation.

According to reports, this hole cuts the hacker’s time and effort significantly. There is less effort in trying out combinations, reducing attempts from 100 million to 11,000.

In its warning, the US-CERT site said “We are currently unaware of a practical solution to this problem.”

Its recommended workaround was to disable WPS. Though not a solution, it said a recommendation was to only use WPA2 encryption with a strong password, disabling UPnP, and enabling MAC address filtering so only trusted computers and devices can connect to the wireless network.

Affected vendors include Belkin, Buffalo, D Link, Linksys, Netgear, Technicolor, TP-Link, and ZyXEL.

Viehbock, meanwhile, said he was working on a brute force tool, which he may release once he works the code into better shape.

Explore further: Millions without mobile phone service in Argentina

More information: www.kb.cert.org/vuls/id/723755
sviehb.wordpress.com/

Related Stories

Netgear Launches A New Family Of Wireless-N Routers

Sep 29, 2008

Netgear today has announced a new family of Wireless-N networking solutions that will make it easy for anyone to upgrade their wireless home network to Wireless-N technology. This new technology supports the ...

Researchers find way to measure effect of Wi-Fi attacks

Sep 12, 2011

Researchers from North Carolina State University have developed a way to measure how badly a Wi-Fi network would be disrupted by different types of attacks – a valuable tool for developing new security technologies.

Simple security for wireless: no password required

Aug 22, 2011

In early August, at the Def Con conference — a major annual gathering of computer hackers — someone apparently hacked into many of the attendees’ cell phones, in what may have been the first successful breach ...

Recommended for you

Britain's BT in talks to buy mobile operator EE

Dec 15, 2014

BT Group PLC said Monday it is in exclusive talks to buy mobile phone operator EE from Germany's Deutsche Telekom and France's Orange for 12.5 billion pounds ($20 billion) in cash and shares.

Re-imagining the network

Dec 12, 2014

Communication networks are evolving to keep pace with increasing consumer needs and business demands. We've already experienced the progressive jumps from 1G to 4G wireless networks and 5G is looming in the not-too-distant ...

High-speed Internet on its way to more schools

Dec 11, 2014

The Federal Communications Commission agreed Thursday to dramatically boost spending to bring high-speed Internet access to schools and libraries in poor or rural areas, a move that would likely increase Americans' phone ...

User comments : 7

Adjust slider to filter visible comments by rank

Display comments: newest first

DDBear
5 / 5 (1) Dec 29, 2011
I've hated WPS anyway so I'd be glad to see this standard disappear entirely. It is supposed to make the setup easier for beginners, but WPS just confuses things. It's easy enough to just enter the WPA2 encryption key!
jimbo92107
5 / 5 (1) Dec 29, 2011
Just go into your router and disable WPS. Problem solved. As DDBear says, WPS is more confusing than helpful anyway. Stick with WPA2, it's good enough for now.
kaasinees
1 / 5 (1) Dec 29, 2011
nope.avi

*mac filter WPA2*
Feldagast
5 / 5 (2) Dec 29, 2011
Why I used wired networking in my house.
mattytheory
3 / 5 (2) Dec 29, 2011
I whitelist the MAC's of authorized devices. Problem solved.
Feldagast
Dec 29, 2011
This comment has been removed by a moderator.
electric
not rated yet Jan 03, 2012
"I whitelist the MAC's of authorized devices. Problem solved."

That's about the worst security method.
http://en.wikiped...ofing.29
mattytheory
not rated yet Jan 09, 2012
Thank you electric. You are correct, I was not aware of the gaping security hole.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.