Vulnerability of WPS implementation in some wireless LAN routers-Researchers point out
ZDNET JAPAN STAFF
2014-09-01 13:46
Here's My Content
Dominique Bongard, a Swiss security company 0xcite, and founder Dominique Bongard, has found a way to quickly enter the wireless router network that does not properly implement the WPS (Wi-Fi Protected Setup) function.The information is published in Slideshare.
Some implementation of the WPS function include a weak random number or random number itself when generating keys used for PIN code type hardware authentication.This attack is a defect of such implementation, and offline calculations can quickly collect enough information that can be guessed Pin.In this new attack method, the number of passwords consisting of numerical values does not discover the correct PIN instead of the Blue Force attack, so that companies can neutralize defense measures.
According to Ars Technica, which reported the first report, it took about 4 hours to find the correct PIN that enables the router's WPS function, but a new attack method is a single trial.Bongard states that it is only necessary to execute a series of offline calculations.
This vulnerability does not exist in any router.According to Ars Technica, the implementation of two chipset manufacturers is affected by the problem.One of the two companies is Broadcom.Another company says Bongard says he wants to hide his name until the company can deal with the problem.Many router makers customize based on basic software implementation when developing their own router software, but the random numbers created by the random number generators in Broadcom reference implementation are weak, but another company.Uses a special seed (random number), that is, zero nonce, and has no effect.
Slideshare's slide states, "Let's disable WPS now!"
This article edited an article from overseas CBS Interactive by Asahi Interactive for Japan.
ZDNET JAPAN article is read by email every morning (free registration)
メールマガジン購読のお申し込み