FreeBSD Security Advisory - FreeBSD-SA-18:11.hostapd

Discussion in 'News Aggregator' started by Packet Storm, 16 Aug 2018.

  1. Packet Storm

    Packet Storm Guest

    FreeBSD Security Advisory - When using WPA2, EAPOL-Key frames with the Encrypted flag and without the MIC flag set, the data field was decrypted first without verifying the MIC. When the dta field was encrypted using RC4, for example, when negotiating TKIP as a pairwise cipher, the unauthenticated but decrypted data was subsequently processed. This opened wpa_supplicant(8) to abuse by decryption and recovery of sensitive information contained in EAPOL-Key messages. All users of the WPA2 TKIP pairwise cipher are vulnerable to information, for example, the group key.

    Continue reading...
     

Share This Page

Loading...