Wi-Fi brute-force attacks feasible: Researcher

IASI, Romania — Design flaws in the Wi-Fi Protected Setup (WPS) wireless standard can make it easier for attackers to obtain access codes for secured wireless networks by brute force, says a security researcher.

The vulnerabilities identified by Stefan Viehbock affect a large number of WPS-enabled routers and wireless access points.

The WPS standard was created in 2007 by the Wi-Fi Alliance in order to provide non-technical users with a simple method of setting up wireless networks.

The standard supports several Wi-Fi authentication methods including one that requires pushing a physical button on the router and one that uses a predefined PIN number printed on a sticker by the device manufacturer.

The PIN-based method is mandatory for WPS-certified devices, which support it by default. Devices that are WPS-capable, but aren’t certified, are also likely to use the method.

The WPS PIN is an eight-digit random number. Under normal circumstances, it would take 100 million attempts to crack it. However, because of some bad design choices, this can be reduced to only 11,000 attempts, Viehbock said in a research paper published Dec. 28.

The main problem lies with how devices respond to failed WPS authentication attempts. The replies can indicate if the first or second halves of the PIN number are correct, significantly reducing the complexity of a brute-force attack. The fact that the last digit is actually the checksum of the other seven makes it even easier.

An authentication attempt takes between 0.5 and 3 seconds, allowing an attacker to go through all 11,000 combinations in less than four hours. “On average an attack will succeed in half the time,” Viehbock said.

The researcher identified vulnerable devices from multiple vendors including Cisco System Inc.’s Linksys, Netgear, D-Link, Buffalo, Belkin, ZyXEL, TP-Link and Technicolor, but he believes that others are affected as well.

The majority of router manufacturers don’t implement lock-down periods after failed WPS authentication attempts. During Viehbock’s tests, only a Netgear device was found to have such protection, but it was insufficiently aggressive and allowed the attack to be performed in less than a day.

The U.S. Computer Emergency Readiness Team (US-CERT) was alerted about the vulnerabilities at the beginning of December and notified some of the affected vendors. The only known workaround at the moment is to disable WPS, US-CERT said in its advisory.

UPDATE: In his latest posting, Viehbock says another researcher confirmed his findings and also posted a solution.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now