How good is the new Wi-Fi Protocol (WPA3)? Security flaws Exposed!

The new WPA3 is busted with several devices implicated. How were the security flaws identified?

Network security has always been a debate with constant advances in technology. However, many people out there still do not know much about network security. This does not stop geeky or talented tech minded individuals or group of people from hunting for possible vulnerabilities or flaws.
Though, Wi-Fi passwords are now tougher to crack, each of its protocols has had its fair share of flaws. What is surprising is that, the fairly new WPA3 ( Wi-Fi Protected Access protocol version 3) still remains vulnerable to attack, thanks to some serious flaws in design.

*Note: This article is displayed as an AMP when viewed on a smartphone. You can switch to the Full Mobile Version Here.*

Mathy Vanhoef and Eyal Ronentitled recently authored a paper termed Dragonblood - A Security Analysis of WPA3’s SAE Handshake. In it, they discuss elements of WPA3 that in some cases still leave it vulnerable to attacks like the previous WPA2. This is summarzed as follows:

- WPA3-Transition mode is  one of the remarkable things of the WPA3 protocol. This brings backwards-compatible with older ones which otherwise do not support it. Unfortunately, this backwards-compatible  process can be exploited. This is because it allows for networks to support both WPA3 and WPA2 using the same password. This potentially allows an attacker the ability to create a malicious WPA2 network with same SSID as the original. Client devices in the transition mode will then connect to the malicious network using WPA2, leaving the handshake exposed. Many newer devices were tested and found to have the flaw, but it remains a serious concern especially in low cost devices.

-WPA2 relied on a four-way handshake as a means of authentication for devices. This handshake contains a hash of the network password which leaves it open to cracking if intercepted or exposed. This process is still shared by the new protocol, hence it can easily be compromised.

-WPA3 is also vulnerable to side-channel leaks, both cache-based and timing-based. These leaks can potentially reveal information about the network password.

I will leave a link below for people who want more technical details.

In conclusion, a strong password on your network is strongly recommended, while we hope for resolutions in the future.



DreamPoinTech: Tech, Business, Health: How good is the new Wi-Fi Protocol (WPA3)? Security flaws Exposed!
How good is the new Wi-Fi Protocol (WPA3)? Security flaws Exposed!
The new WPA3 is busted with several devices implicated. How were the security flaws identified?
DreamPoinTech: Tech, Business, Health
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content