About Us | Contact Us
View Cart

WPA2 Vulnerable To Attack

By Vigilize | Friday, November 10, 2017 - Leave a Comment

While Many Devices Have Already Been Patched, Many More May Never Be…


An article review.


ServIcons_ITAudit_01

When does exploit news cross the line into being a trend? How about when it impacts essentially every single wi-fi enabled device? That’s the takeaway from the recently announced vulnerability in the WPA2 wireless security standard, detailed in this TechCrunch article submitted by our friend Wes Pollard at Home Bank.

While the technical details of this attack are certainly interesting, we’ve been taken aback by the scope of the news in both the number of devices impacted and just how long we may be experiencing the effects: The attack is not in a specific implementation of wi-fi on a specific device but is instead part of the WPA2 protocol itself, every wi-fi enabled device made since the introduction of that standard can fall, victim.

You can, though, breath a little easier knowing that the providers of major operating systems both desktop and mobile have issued security patches, and replacement of those devices won’t be necessary. The problem lies with the millions of wi-fi devices that either have no ability to be updated at all, or simply won’t be receiving an update–think of your Internet-of-Things devices like thermostats, light bulbs, appliances and so on: if it is connected to your network and hasn’t been updated, it will remain an open door to any interested parties.

The situation reminds us of the original Wi-Fi encryption standard, WEP, which was compromised shortly after introduction. Despite widespread knowledge of WEP’s failures, and the relatively small number of deployed wi-fi devices compared to today, one could find WEP-enabled devices during scans for quite some time–and even today. The sobering truth is that for many people “hardware is forever” and as long as the device is functional it will remain undisturbed and vulnerable.

As we continue down the road of adding wireless functionality to everything it may be time to question whether or not we really need to be able to change the color of our bedroom’s lighting from our smartphone, and whether that convenience comes with costs we haven’t anticipated.


Original article by Natasha Lomas writing for TechCrunch.


same_strip_012513


 

Latest News
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Many organizations still fail to consider the unique risks posed by cloud computing… An article review. Last month thousands of Western Digital MyCloud device owners learned about the risks of cloud-based solutions the hard way: their data had been wiped remotely due to a flaw in the internet-facing component of their external hard drives. While […]
    infotex does not use Kaseya… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As you may be aware there was a large ransomware attack recently that leveraged a remote management tool called Kaseya that is used by many […]
    While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS Dan Hadaway and Sara Fultz co-wrote an article in the Spring 2021 issue of the Ohio Record, the Official Magazine of the Ohio Bankers League.  Find out on page 20 and 21 of the magazine how tabletop testing strengthens bank cybersecurity. You can read the article here! […]
    You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall Technology Risk Monitoring process. And whether […]
    After the large number of high-profile breaches in the recent months, it is easy to become disconcerted about how to prevent such things from happening to your Bank. The answer to preventing a breach is a very complex one. infotex will explore this with you! The heightened level of awareness and extra protective tendencies that […]
    A follow-up on Dan’s 2008 Password Manifesto On the NIST Publication on Digital Identity Guidelines Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . In June 2017, NIST released a special publication on digital identity, NIST SP 800-63, that is starting to get the attention […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Over Seven Billion Usernames Have Been Leaked in Breaches Since 2011… An article review. An unfortunate fact of modern life seems to be the inevitable announcement of new data breaches, and if you’ve lost track of how many breaches you’ve had to perform a risk assessment on you’re probably not alone…but just how much personal […]