Feeds

New flaw takes Wi-Fi off the air

Jam today and jam tomorrow

  • alert
  • submit to reddit

The smart choice: opportunity from uncertainty

A newly-discovered vulnerability in the 802.11 wireless standard allows attackers to jam wireless networks within a radius of one kilometre using off-the-shelf equipment.

Affecting various hardware implementations of the IEEE 802.11 wireless networking standard - including widely used 802.11b devices - the flaw was found in the collision avoidance routines used to prevent multiple devices from transmitting at the same moment.

"When under attack, the device behaves as if the channel is always busy, preventing the transmission of any data over the wireless network," a security advisory released by AusCERT reads.

The weakness allows miscreants to take down networks within five seconds, according to researchers at Australia's Queensland University of Technology's Information Security Research Centre (ISRC), which discovered the vulnerability.

ISRC's leader of network and systems security research, Associate Professor Mark Looi, whose PhD students, Christian Wullems, Kevin Tham and Jason Smith discovered the flaw, said any organization that relies heavily on wireless infrastructure should take the threat seriously.

"Anyone who's relying on the availability of a wireless network should really consider that their wireless network can be knocked offline at any time," said Looi. "They need to very seriously evaluate that network and decide if it's possible to move away from wireless technology."

While previous denial of service attacks against wireless networks have required specialised hardware and relied on high-power antennas, the new attack will make knocking a wireless network off the air an option for a "semi-skilled" attacker using standard hardware.

"An attacker using a low-powered, portable device such as an electronic PDA and a commonly available wireless networking card may cause significant disruption to all WLAN traffic within range, in a manner that makes identification... of the attacker difficult," The AusCERT advisory read.

Because the flaw is in the 802.11 protocol itself, the vulnerability cannot be mitigated through the use of software or encryption schemes. Replacing wireless devices with those not affected by the flaw seems the only option, said Looi.

"Mitigation strategies are few and far between," Looi said "Organisations could deploy wireless networks that don't use this technology, [but] it will be a very expensive exercise."

The flaw is only present in devices using a Direct Sequence Spread Spectrum (DSSS) physical layer, including IEEE 802.11, 802.11b and 802.11g wireless devices operating at low speed. 802.11a and 802.11g wireless devices configured to operate at speeds above 20Mbps are not affected by the glitch,

AusCERT senior security analyst Jamie Gillespie does not anticipate the wide exploitation of the vulnerability.

"For the average corporate user, we're not expecting to see ongoing denial of service attacks. However, if you have remote equipment that is only connected through wireless it is possible that the connection could be disrupted," Gillespie said. "Some critical infrastructure providers may not deploy wireless... but if any do then they should be looking at mitigation strategies."

The lack of a "measurable result" during an attack is likely to render the average attacker bored, Gillespie added.

Unlike flaws discovered in the WEP encryption scheme, the newly-disclosed vulnerability will not allow an attacker to snoop on network communications.

The ISRC findings will be presented to the Institute of Electrical and Electronic Engineers (IEEE) Wireless Telecommunication Symposium in California on Friday.

Copyright © 2004, SecurityFocus logo

Related stories

Wi-Fi group to update WLAN spec
The Wi-Fi user as wireless felon
Cisco thwarts WLAN dictionary attack
Wi-Fi Alliance preps WPA 2 security spec

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.