By Darren Pauli, 1 Sep 2014
Passwords within routers sold by chipset manufacturer Broadcom and an unnamed vendor can be accessed within seconds thanks to weak or absent key randomisation, security bod Dominique Bongard has claimed.
The weakness relates to the implementation of WiFi Protected Setup (WPS) which allowed attackers to calculate the correct key offline.
Broadcom products lacked key randomisation while the unnamed vendor (not Atheros, Bongard said in response to rumours), used a non-random seed value or nonce
The Register/ full article here/ http://www.theregister.co.uk/2014/09/01/wps_flaw_leaves_home_routers_vulnerable/
Be the first to reply!
Reply
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.