Close Menu
CrafficCraffic
  • Home
  • News
    • Internet
    • Gaming
  • Tech
    • Hardware
    • Gaming Tech
    • Mobile Phones
    • Software
  • Science
    • Astronomy
    • Discoveries
    • Psychology
  • Entertainment
    • Anime
    • Reviews
    • Spotlight
    • WWE
Facebook X (Twitter) Instagram
CrafficCraffic
  • Home
  • News
    • Internet
    • Gaming
  • Tech
    • Hardware
    • Gaming Tech
    • Mobile Phones
    • Software
  • Science
    • Astronomy
    • Discoveries
    • Psychology
  • Entertainment
    • Anime
    • Reviews
    • Spotlight
    • WWE
Facebook X (Twitter) Instagram
CrafficCraffic
Home » New WiFi vulnerability leaves millions of devices open to ‘frag attacks’, here’s how to be safe from them
Internet

New WiFi vulnerability leaves millions of devices open to ‘frag attacks’, here’s how to be safe from them

Sahil NegiBy Sahil NegiMay 12, 2021Updated:May 13, 2021No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
cybersecurity wifi
Share
Facebook Twitter LinkedIn Pinterest Email

A vulnerability has been found by a security researcher who is well-known for finding out flaws in WiFi security. The recently discovered flaws, dubbed “frag attacks,” are thought to be common because they arise in the WiFi standard, with some vulnerabilities dating back to 1997.

According to Belgian security researcher Mathy Vanhoef’s blog, many additional vulnerabilities are triggered by programming errors in WiFi devices and affect any WiFi device.

The vulnerabilities may theoretically allow an intruder within the radio range to steal user information or target devices if they were exploited. However, since the bugs involve user input or unusual network configurations, the odds of the flaws being exploited should be small.

Vanhoef clarified how the flaws work, saying that some of them can be used to “easily inject” plaintext frames into a secure Wi-Fi network and that some systems accept “plaintext aggregated frames that look like handshake messages.”

According to the researcher, this can be used to intercept traffic by tricking the victim into using a malicious DNS server. Vanhoef discovered that this flaw impacted two out of four tested home routers, as well as some IoT devices and several smartphones, in his tests.

Vanhoef also posted a video example of the bugs, which includes a step-by-step description of the frag attacks.

Vanhoef shared his results with the Wi-Fi Alliance, as he had done in the past, including the 2017 “Krack Attack.” The agency has been consulting with device manufacturers on upgrades to fix the bugs for the past nine months.

As a response, several patches have been published or are in the works. According to cybersecurity news site The Record, Microsoft patched three of the 12 vulnerabilities that affect Windows systems in patches issued on March 9th. According to ZDNet, a patch for the Linux kernel is now making its way into the release system.

Anything else you need to do is to foloow some steps advised by Vanhoef:

  • Keep your computers updated
  • Use strong and unique passwords
  • Don’t visit shady sites
  • And most important make sure you’re using HTTPS as often as possible

Cybersecurity Internet News WiFi
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBody Processes can now be Monitored by this Injectable Wireless Chip Developed by Columbia University
Next Article A New Kind of Stress Response Triggered While Driving discovered by Scientists
Sahil Negi

Related Posts

Gaming

God of War Ragnarok, Greatest of all time?

December 23, 2022
Gaming

How good will be Gran Turismo 7’s superhuman AI?

February 12, 2022
Entertainment

EXCLUSIVE! Dane DeHaan JOINS Christopher Nolan’s historical drama ‘Oppenheimer’

February 9, 2022
Add A Comment

Leave A Reply Cancel Reply

At Craffic we ensure delivering quality content to our readers as they are giving us their precious time to engage with our content. And Craffic was a vision of a group of school friends and they've made it possible by learning the basics of strategies used in the media culture. ‎ ‎ ‎‎ ‎ ‎

Quick Access
  • About Us
  • Contact us
  • Terms of Use
  • Privacy Policy
Facebook X (Twitter) Instagram Pinterest
© 2025 Craffic. Designed by StackX Solutions.

Type above and press Enter to search. Press Esc to cancel.