Security Advisory: Wi-Fi Fragmentation and Aggregation Attacks
What Happened?
A new set of Wi-Fi vulnerabilities has been discovered by Mathy Vanhoef and was released on May 11, 2021. These vulnerabilities are core to the design and implementation of the IEEE 802.11 standard affecting almost all Wi-Fi capable devices, and include the following CVEs:
CVE | Description |
---|---|
CVE-2020-24586 | Not clearing fragments from memory when (re)connecting to a network |
CVE-2020-24587 | Reassembling fragments encrypted under different keys |
CVE-2020-24588 | Accepting non-SPP A-MSDU frames |
CVE-2020-26139 | Forwarding EAPOL frames even though the sender is not yet authenticated |
CVE-2020-26140 | Accepting plaintext data frames in a protected network |
CVE-2020-26141 | Not verifying the TKIP MIC of fragmented frames |
CVE-2020-26142 | Processing fragmented frames as full frames |
CVE-2020-26143 | Accepting fragmented plaintext data frames in a protected network |
CVE-2020-26144 | Accepting plaintext A-MSDU frames that start with an RFC1042 header with EtherType EAPOL (in an encrypted network) |
CVE-2020-26145 | Accepting plaintext broadcast fragments as full frames (in an encrypted network) |
CVE-2020-26146 | Reassembling encrypted fragments with non-consecutive packet numbers |
CVE-2020-26147 | Reassembling mixed encrypted/plaintext fragments |
As noted in the original post, Mathy states:
The discovered vulnerabilities affect all modern security protocols of Wi-Fi, including the latest WPA3 specification. Even the original security protocol of Wi-Fi, called WEP, is affected. This means that several of the newly discovered design flaws have been part of Wi-Fi since its release in 1997! Fortunately, the design flaws are hard to abuse because doing so requires user interaction or is only possible when using uncommon network settings. As a result, in practice the biggest concern are the programming mistakes in Wi-Fi products since several of them are trivial to exploit.
These vulnerabilities are not restricted to specific devices from specific vendors; over 75 devices from different vendors were tested by Mathy and his team, and all of them were vulnerable to one or more of the discovered attacks.
Does this affect Byos products?
This set of vulnerabilities affects every Wi-Fi enabled device on the planet.
Our security team has been performing ongoing tests on Byos µGateways since the release of these vulnerabilities.
Byos-protected endpoints may be affected by a subset of these attacks based on the design flaws found in:
CVE-2020-24588: Aggregation attack
CVE-2020-24587: Mixed key attack
CVE-2020-24586: Fragment cache attack
How does Byos protect against these vulnerabilities?
Even though Byos devices operate under the 802.11 standard and therefore are technically vulnerable, successfully exploiting these vulnerabilities against a device protected by the Byos µGateway is much less likely to occur, due to the following reasons:
Byos adds a layer of abstraction to the device physically present in the network, isolating the attacker from its victim
Each Byos µGateway runs its own encrypted DNS server and is isolated from the host machine, therefore DNS poisoning is much more difficult to achieve
Byos has Evil Twin Wi-Fi and Man-in-the-Middle protection features, reducing the attackers ability to manipulate the user’s session, traffic, or connection
After a thorough evaluation from our security team, we concluded that using a Byos µGateway provides more security than otherwise using your device’s native Wi-Fi connection.
We will continue to update this page as our security team uncovers more information about these vulnerabilities. A Software update will be published by Byos shortly.
Extra steps for precaution
In practice, these vulnerabilities are difficult to exploit; However, we recommend you follow these basic security best practices to minimize your risk:
Only visit websites that have implemented HTTPS
Update all of your devices on a regular basis
Don’t reuse or share passwords
Use a Byos µGateway when connecting to untrusted Wi-Fi networks
For more information, please visit https://www.fragattacks.com/.