Kr00k, a security flaw in Wi-Fi chips allows attackers to decrypt the WPA2-encrypted traffic.
The vulnerability affects Broadcom and Cypress chips, these are the most common chips used by several client devices including top brands such as Amazon (Echo, Kindle), Apple (iPhone, iPad, MacBook), Google (Nexus), Samsung (Galaxy) and others.
Not only client devices this vulnerability also affects the Wi-Fi Access points and routers.
Security researchers from ESET discovered the vulnerability dubbed Kr00k and assigned CVE-2019-15126. An attacker can exploit the vulnerability by eavesdropping the communication of an unpatched device.
If the attack is successful then attackers can exfiltrate sensitive data from the target device. The attack abuses implementation flaws with Wi-Fi chips.
Generally, packets are encrypted with a unique key based on the Wi-Fi network password. When a device disassociated from the Wi-Fi network, with the vulnerable chips keys are zeroed out and then buffered data sent with zero encryption.
By triggering the disassociation continuously the attacker can decrypt some wireless network packets transmitted by a vulnerable device.
The vulnerability affected both WPA2-Personal and WPA2-Enterprise protocols, with AES-CCMP encryption.
Kr00k also related to KRACK vulnerability which was founded in 2017. “Kr00k is one of the possible reasons behind the “reinstallation” of an all-zero TK, which has been observed while testing for KRACK attacks.”
Here is the difference between KRACK and Kr00k
ESET reported the vulnerability to chip manufacturers Broadcom and Cypress who fixed the issue, also ESET worked ICASI to make sure all the vendors aware of Kr00k.
The vulnerability is no way associated with the Wi-Fi password, changing the Wi-Fi password is not a fix for the vulnerability.
If you are using affected chips, it is recommended to update devices with Broadcom or Cypress chips to the latest software versions.
Device manufacturers are recommended to chip manufacturer for details about patches for the Kr00k vulnerability.
A critical security vulnerability has been discovered in the popular WordPress plugin Anti-Spam by CleanTalk, which…
SpyLoan apps, a type of PUP, are rapidly increasing, exploiting social engineering to deceive users…
CyberVolk, a politically motivated hacktivist group, has leveraged readily available ransomware builders like AzzaSec, Diamond,…
A ransomware attack on Blue Yonder, a leading supply chain management software provider, has created…
Dell Technologies has released a security update for its Wyse Management Suite (WMS) to address…
The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team Assessment…
View Comments
"WPA2-encrypted traffic" wow!!! When you create such scare mongering news about hacking, vulnerability etc which are sure head turners, please maintain some technical sanity as well. The wifi routers dont encrypt the 'traffic' with wpa2, instead wpa2 is only used for password encryption of the router with which it allows devices to connect to. Once the device is connected, the wpa2 encryption has no role in the traffic that the router and the connected devices exchange.
This is from around July 2017?
Ah that was KRACK. My bad