Cyber Security researchers Found a new Weak hole in WPA3 Protocol named as “Dragonblood” allows hackers to steal the WiFi Password from WP3 enabled WiFi Network.
According To Cyber Security researchers, This serious vulnerability in WPA3 protocol let Hackers Hack Your password and access the encrypted traffic to steal sensitive data transmitted such as credit card numbers, passwords, chat messages, emails.
WPA3 protocol was recently announced by Wi-Fi Alliance and claims that it is impossible to crack the password of a network due to the powerful Dragonfly handshake but now its proven wrong due to this new Dragonblood vulnerability.
We All Know The Most of the WiFi network still using 14-year-old WP2 protocol which is actually vulnerable to Krack Attack Since then WPA3-Announced to Improve Security for personal and enterprise Wi-Fi networks.
Design Flaw in WPA3 Dragonblood Vulnerability
In this case, Security researchers uncovered two different design flaw in WPA3 Protocol, and both vulnerabilities can be abused by the attacker to steal the password in the targetted Wi-Fi network.
1. Downgrade attacks
2. Side-channels leaks
The first flaw is the Downgrade attack on WP3 is due to a transition mode that implemented in WPA3 by WiFi Alliance allows a network can simultaneously support both WPA2 and WPA3.
Since the WP3 enabled WiFi Network supports both WP2 and WPA3, by setting up a rogue Access point that only supports WPA2 let an attacker connect using WPA2’s 4-way handshake to perform offline Dictionary Attack.
Security researchers said, “Although the client detects the downgrade-to-WPA2 during the 4-way handshake, this is too late. The 4-way handshake messages that were exchanged before the downgrade was detected, provide enough information to launch an offline dictionary attack.”
The 2nd flaw, Side-channels leaks allows attackers to function Cache-based facet channel attack and Time-Based Side-channel Attack due to the vulnerabilities in the Dragonfly handshake.
Cache-Based Side-Channel Attack CVE-2019-9494. let attackers run unprivileged code on the victim computing device and this attack permits to decide which department was taken in the first generation of the password era algorithm of Dragonfly.
“This statistics can be abused to perform a password partitioning attack (this is similar to an offline dictionary attack). “
Similarly, time-based side-channel Attack CVE-2019-9494 abuse the password encoding algorithm of Dragonfly handshake to perform the same password partitioning attack, which is similar to an offline dictionary attack.
In this case, Two researchers, Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) two who located this vulnerability made scripts to take a look at for positive Dragonblood vulnerabilities discovered in WPA3 Protocol:
Dragonslayer: implements assaults in opposition to EAP-PWD (to be released shortly).
Dragondrain: this device can be used to test to which extent an Access Point is prone to denial-of-service assaults towards WPA3’s SAE handshake.
Dragon time: this is an experimental tool to function timing assaults against the SAE handshake if MODP team 22, 23, or 24 is used. Note that most WPA3 implementations with the aid of default do not enable these groups.
Dragonforce: this is an experimental device which takes the data to get better from our timing or cache-based attacks, and performs a password partitioning attack. This is comparable to a dictionary attack.
WiFi Alliance Patched Both Vulnerabilities
Both Vulnerabilities are presently patched and launched a replace by way of WiFi Alliance, a non-profit agency that promotes Wi-Fi technology and certifies Wi-Fi merchandise for conformity to certain requirements of interoperability.
According to WiFi Alliance, There is no evidence of the vulnerability being used against Wi-Fi users maliciously, and Wi-Fi Alliance® has taken instantaneous steps to make sure customers can remember on WPA3-Personal to supply even better security protections.”
“These issues can be resolved through an easy software update – a method a good deal like the software updates Wi-Fi customers often perform on their mobile devices.”