US-CERT says Wi-Fi hole open to brute force attack

Dec 29, 2011 by Nancy Owano report

(PhysOrg.com) -- The US Computer Emergency Readiness Team (US-CERT) has issued a warning about a security hole in the Wi-Fi Protected Set-up protocol for Wi-Fi routers. Security researcher Stefan Viehbock discovered the vulnerability, reported it to the US-CERT, which then issued its public warning earlier this week. Viehbock was able to recognize design decisions about the protocol, which enables an efficient brute force attack.

The US-CERT warning said:

“The WiFi Protected Setup (WPS) PIN is susceptible to a brute force attack. A design flaw that exists in the WPS specification for the PIN authentication significantly reduces the time required to brute force the entire PIN because it allows an attacker to know when the first half of the 8 digit PIN is correct. The lack of a proper lock out policy after a certain number of failed attempts to guess the PIN on some wireless routers makes this brute force attack that much more feasible.”

The , introduced in 2007 by the Alliance, was intended to make life simple for setting up and configuring security on wireless local area networks, especially for home and small office-home (SOHO) environments. “Wi-Fi Protected Setup enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to easily configure new wireless networks, to add new devices and to enable security,” according to the WiFi Alliance white paper.

The simplification resides in the setup process where users only have to type in a shortened PIN instead of longer phrase if adding a new device to a network. By entering the wrong PIN, the hacker gets returned information that could be useful for an attack. The 8-digit PIN's security falls dramatically as more attempts are made. A message sent by the router when the PIN fails informs the hacker if the first four digits are correct; the last digit of the key is used as a checksum and is given out by the router in negotiation.

According to reports, this hole cuts the hacker’s time and effort significantly. There is less effort in trying out combinations, reducing attempts from 100 million to 11,000.

In its warning, the US-CERT site said “We are currently unaware of a practical solution to this problem.”

Its recommended workaround was to disable WPS. Though not a solution, it said a recommendation was to only use WPA2 encryption with a strong password, disabling UPnP, and enabling MAC address filtering so only trusted computers and devices can connect to the wireless network.

Affected vendors include Belkin, Buffalo, D Link, Linksys, Netgear, Technicolor, TP-Link, and ZyXEL.

Viehbock, meanwhile, said he was working on a brute force tool, which he may release once he works the code into better shape.

Explore further: Scientists twist radio beams to send data: Transmissions reach speeds of 32 gigabits per second

More information: www.kb.cert.org/vuls/id/723755
sviehb.wordpress.com/

Related Stories

Netgear Launches A New Family Of Wireless-N Routers

Sep 29, 2008

Netgear today has announced a new family of Wireless-N networking solutions that will make it easy for anyone to upgrade their wireless home network to Wireless-N technology. This new technology supports the ...

Researchers find way to measure effect of Wi-Fi attacks

Sep 12, 2011

Researchers from North Carolina State University have developed a way to measure how badly a Wi-Fi network would be disrupted by different types of attacks – a valuable tool for developing new security technologies.

Simple security for wireless: no password required

Aug 22, 2011

In early August, at the Def Con conference — a major annual gathering of computer hackers — someone apparently hacked into many of the attendees’ cell phones, in what may have been the first successful breach ...

Recommended for you

Oculus unveils new prototype VR headset

10 hours ago

Oculus has unveiled a new prototype of its virtual reality headset. However, the VR company still isn't ready to release a consumer edition.

Wireless sensor transmits tumor pressure

16 hours ago

The interstitial pressure inside a tumor is often remarkably high compared to normal tissues and is thought to impede the delivery of chemotherapeutic agents as well as decrease the effectiveness of radiation ...

Tim Cook puts personal touch on iPhone 6 launch

17 hours ago

Apple chief Tim Cook personally kicked off sales of the iPhone 6, joining in "selfies" and shaking hands with customers Friday outside the company's store near his Silicon Valley home.

Team improves solar-cell efficiency

Sep 19, 2014

New light has been shed on solar power generation using devices made with polymers, thanks to a collaboration between scientists in the University of Chicago's chemistry department, the Institute for Molecular ...

Calif. teachers fund to boost clean energy bets

Sep 19, 2014

The California State Teachers' Retirement System says it plans to increase its investments in clean energy and technology to $3.7 billion, from $1.4 billion, over the next five years.

User comments : 7

Adjust slider to filter visible comments by rank

Display comments: newest first

DDBear
5 / 5 (1) Dec 29, 2011
I've hated WPS anyway so I'd be glad to see this standard disappear entirely. It is supposed to make the setup easier for beginners, but WPS just confuses things. It's easy enough to just enter the WPA2 encryption key!
jimbo92107
5 / 5 (1) Dec 29, 2011
Just go into your router and disable WPS. Problem solved. As DDBear says, WPS is more confusing than helpful anyway. Stick with WPA2, it's good enough for now.
kaasinees
1 / 5 (1) Dec 29, 2011
nope.avi

*mac filter WPA2*
Feldagast
5 / 5 (2) Dec 29, 2011
Why I used wired networking in my house.
mattytheory
3 / 5 (2) Dec 29, 2011
I whitelist the MAC's of authorized devices. Problem solved.
Feldagast
Dec 29, 2011
This comment has been removed by a moderator.
electric
not rated yet Jan 03, 2012
"I whitelist the MAC's of authorized devices. Problem solved."

That's about the worst security method.
http://en.wikiped...ofing.29
mattytheory
not rated yet Jan 09, 2012
Thank you electric. You are correct, I was not aware of the gaping security hole.