Light Reading

Users Eye New 802.11 Security Issues

Dan Jones
LR Mobile News Analysis
Dan Jones, Mobile Editor
8/11/2006
50%
50%

Some of the underlying 802.11 security issues revealed at the recent Black Hat security show have led some experts to recommend that users turn off their WiFi radios when not in use.

A presentation by Jon Ellch and David Maynor showed a video demo of a hack using the underlying wireless drivers to quickly access a Mac computer, although the attack also works against Windows machines. (See Intel's Centrino Vulnerability.) The two researchers demonstrated how wireless drivers could establish a connection and seize control of a laptop, even if the laptop was not associated with any WiFi access point. The two-step demonstration forced the victim's notebook to establish a connection to the hacker's PC, and seized control of the laptop once the connection was established.

This exploit could potentially allow attackers to commandeer anyone's laptop -- as long as a wireless capability is installed and enabled. The demo has renewed enterprise concerns about the security fitness of 802.11 once again.

Roger Cass, CTO at healthcare firm MediSync, says he will take a number of measures to protect against the threat. "Our first step would be to caution our laptop users to leave their radios off unless they are actively using them," he tells Unstrung. "Next would be to avoid using hotspots unless necessary."

"Lastly, we would have to wait for driver fixes from the radio manufacturers. Since this was a hot topic, I imagine some patches will be forthcoming. The key is to find the updated drivers and install them," Cass said.

Third-party WiFi security companies such as AirTight Networks Inc. and Network Chemistry Inc. have already piped up to say that their products protect against the hack.

The key danger, however, is likely to be a lack of user awareness about when their WiFi radio is actually enabled. Often, many users simply do not realize that they are connected via WiFi -- either in the office or in a public space. (See Five WiFi VOIP Security Issues .)

— Dan Jones, Site Editor, Unstrung

(1)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
alockhart
50%
50%
alockhart,
User Rank: Light Beer
12/5/2012 | 3:44:53 AM
re: Users Eye New 802.11 Security Issues
It should be noted that these vulnerabilities are caused by poor coding and/or testing in the drivers for wireless cards from Intel and Apple. To put the risk into perspective, at DEFCON, over 60 percent of the wireless devices detected were from these two vendors. However, these types of issues have a much broader reach and likely affect more than just Intel and Apple.

These latest examples of vulnerabilities in wireless cards reflect a growing trend of vulnerabilities being found in the wireless client packages and drivers. Prior examples have been recognized and documented by the Wireless Vulnerabilities and Exploits project (www.wirelessve.org). Earlier this year an integer overflow was discovered in FreeBSDGs 802.11 stack (WVE-2006-0004). Additionally, both Linux and Windows have driver and other low-level disclosure vulnerabilities that can reveal the contents of a systemGs memory to remote attackers (WVE-2006-0005, WVE-2006-0047, and WVE-2006-0043).
Flash Poll
LRTV Custom TV
A New Security Paradigm in SDN/NFV

7|28|14   |   02:54   |   (0) comments


Paul Shaneck, Global Director Network Solutions for Symantec, discusses the evolving virtualized network, explaining how Symantec is leading the security discussion as it relates to SDN and NFV, and helping to ensure the network is protected and compliant.
LRTV Documentaries
Sprint's Network Evolution

7|24|14   |   14:59   |   (0) comments


Sprint's Jay Bluhm gives a keynote speech at the Big Telecom Event (BTE) about Sprint's network and services evolution strategy, including Spark.
LRTV Documentaries
BTE Keynote: The Software-Defined Operator

7|24|14   |   18:43   |   (1) comment


Deutsche Telekom's Axel Clauberg explains the concept of the software-defined operator to the Big Telecom Event (BTE) crowd.
Light Reedy
Numbers Are In: LR's 2014 Salary Survey

7|24|14   |   1:25   |   (7) comments


Our fourth annual Salary Survey paints a picture of who's hiring, firing, earning, and yearning for a change in the telecom industry.
LRTV Custom TV
Driving the Network Transformation

7|23|14   |   4:29   |   (0) comments


Intel's Sandra Rivera discusses network transformation and how Intel technologies, programs, and standards body efforts have helped the industry migration to SDN and NFV.
LRTV Custom TV
Distributed NFV-Based Business Services by RAD

7|18|14   |   5:38   |   (0) comments


With the ETSI-approved Distributed NFV PoC running in the background, RAD's CEO, Dror Bin, talks about why D-NFV makes compelling sense for service providers, and about the dollars and cents RAD is putting behind D-NFV.
LRTV Custom TV
MRV – Accelerating Packet Optical Convergence

7|15|14   |   6:06   |   (0) comments


Giving you network insight to make your network smarter.
LRTV Custom TV
NFV-Enabled Ethernet for Generating New Revenues

7|15|14   |   5:49   |   (0) comments


Cyan's Planet Orchestrate allows service providers and their end-customers to activate software-based capabilities such as firewalls and encryption on top of existing Ethernet services in just minutes.
LRTV Custom TV
Symkloud NVF-Ready Video Transcoding, Big Data

7|9|14   |   3:41   |   (0) comments


Kontron and ISV partner Vantrix demonstrate high-performance video transcoding and data analytic solutions on same 2U standard platform that is ready for SDN and NFV deployments made by mobile, cable and cloud operators.
LRTV Huawei Video Resource Center
The Evolving Role of Hybrid Video for Competitive Success

7|4|14   |   4:09   |   (0) comments


At Huawei's Global Analysts Summit in Shenzhen, China, Steven C. Hawley from TV Strategies speaks to us about the evolving role of hybrid video for competitive success.
LRTV Huawei Video Resource Center
How CSPs Leverage Big Data in the Digital Economy

7|4|14   |   4:48   |   (2) comments


Justin van der Lande from Analysys Mason shares with us his views on how telecom operators can leverage customer asset monetization with big data. His discusses the current status of big data applications and the challenges and opportunities for telecom operators in the digital economy era.
LRTV Huawei Video Resource Center
Accelerator for Digital Business – Future Oriented BSS

7|4|14   |   3:08   |   (0) comments


Mobile and internet are becoming intertwined; IT and CT are integrating; and leading CSPs have begun to transform to information service and entertainment providers. How should the BSS system evolve to enable this transformation? Karl Whitelock, an analyst at Frost & Sullivan, shares his views.
Upcoming Live Events!!
September 16, 2014, Santa Clara, CA
September 16, 2014, Santa Clara, CA
October 29, 2014, New York City
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 9-10, 2014, Reykjavik, Iceland
Infographics
Packet Design asks network professionals how they handle the cloud, SDN, and network management.
Today's Cartoon
Vacation Special Caption Competition Click Here
Latest Comment
Hot Topics
Facebook: 30% of Users Are Mobile-Only
Mitch Wagner, West Coast Bureau Chief, Light Reading, 7/24/2014
Is Windstream Boldly Setting a New Trend?
Carol Wilson, Editor-at-large, 7/29/2014
Nokia Holds Steady in Q2, Raises Outlook
Ray Le Maistre, Editor-in-chief, 7/24/2014
U-verse Growth Slips But Still Strong
Alan Breznick, Cable/Video Practice Leader, 7/24/2014
Verizon Applies 3G Throttling Policy to LTE
Sarah Reedy, Senior Editor, 7/25/2014
Like Us on Facebook
Twitter Feed