Rubbish WPS config sees WiFi router keys popped in seconds

  • 1 September 2014
  • 0 replies
  • 170 views

Userlevel 7
By Darren Pauli, 1 Sep 2014
 
Passwords within routers sold by chipset manufacturer Broadcom and an unnamed vendor can be accessed within seconds thanks to weak or absent key randomisation, security bod Dominique Bongard has claimed.
The weakness relates to the implementation of WiFi Protected Setup (WPS) which allowed attackers to calculate the correct key offline.
 
Broadcom products lacked key randomisation while the unnamed vendor (not Atheros, Bongard said in response to rumours), used a non-random seed value or nonce
 
The Register/ full article here/ http://www.theregister.co.uk/2014/09/01/wps_flaw_leaves_home_routers_vulnerable/
 

0 replies

Be the first to reply!

Reply