Your devices Heartbleeding - again
Access points, Android devices fall to Cupid's arrow
Heartbleed is still offering rich pickings for security researchers, and presumably hackers, with Luis Grangeia of Sysvalue demonstrating attacks against wireless (and some wired) networking infrastructure using libraries linked to vulnerable OpenSSL versions.
The Lisbon-based researcher has demonstrated that this affects wireless infrastructure, some Android devices, Radius servers, and possibly reaching as far as iOS, OS X, and VoIP phones.
The basis of the “Cupid” attack tool demonstrated by Grangeia in this slideshow is that the popular EAP-PEAP, EAP-TTLS and EAP-TLS authentication protocols might (depending on the underlying implementation) use the vulnerable version of OpenSSL.
While some access points will have been patched, there's probably a bunch that haven't been, if only because even enterprise users might not have realised that they were vulnerable.
As Grangeia notes: “All these use a TLS tunnel over EAP to secure some part of the authentication process”.
His Cupid tool (proof-of-concept at github) has a patch for wpa_supplicant that implements a Heartbleed attack against access points, while hostapd-cupid attacks vulnerable terminals.
Freeradius is also vulnerable, Grangeia says, if it's linked to a vulnerable OpenSSL implementation.
Grangeia says the proof-of-concept demonstrates that two beliefs about OpenSSL and Heartbleed are mistaken: that Heartbleed was only exploitable over TCP, and that it can only be exploited after the TLS handshake. ®
Sponsored: Global DDoS threat landscape report