Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi all! We have been experiencing an issue on site where threads have been missing the latest postings. The platform host Vanilla are working on this issue. A workaround that has been used by some is to navigate back from 1 to 10+ pages to re-sync the thread and this will then show the latest posts. Thanks, Mike.
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Is VirginMedia Hub 3.0 vulnerable for KRACK attack?

  • 16-10-2017 6:40pm
    #1
    Registered Users Posts: 66 ✭✭


    Hi,

    I am referring to the recently announced KRACK attack which exploits WPA2 protocol. https://www.krackattacks.com/

    In short: it allows to intercept comms between router and client (MITM attack) without using password for Access Point. I feel it quite risky nowadays because WPA2 became defacto industry standard and is used in most homes/organizations.

    If I understood correctly it wasn't clearly confirmed by a security researcher that Access Points are exploitable, client-side was targeted when they discovered vulnerability, however in the mean time they are saying they informed AP/routers vendors to address this problem to them.

    Can VirginMedia comment on this?

    @other_professionals: your thoughts?


Comments

  • Registered Users, Registered Users 2 Posts: 5,237 ✭✭✭Yggr of Asgard




  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    COMPAL will likely have to fix this due to the pressure, that'll then be branded and pushed out by VM.

    The EPCs might get fixed as Cisco are a serious operation. Older Thompsons? Who knows. Ubee? No idea.


  • Registered Users, Registered Users 2 Posts: 5,237 ✭✭✭Yggr of Asgard


    COMPAL is a proud member of the Wifi Standards Org so I would assume they already are working on it, but the researchers point out, that clients are the problem and very limited access points have the issue.

    Let's see what yarn VM is going to spin tomorrow about it, in the meantime, check your client because that seams to be the more important part at this point.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Im september patch level, not november, so I'll need to wait for the ROM developers to push a new build.


  • Registered Users, Registered Users 2 Posts: 5,237 ✭✭✭Yggr of Asgard


    Lucky you if you have a reliable vendor, I'm afraid my otherwise excellent Vodafone Smart Platinum 7 is not going to get an upgrade (as they are way behind and I think have abandon their TCL partnership).

    As to VM there are now a couple of posts in the VM forum, so let's see what they come up with.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 13,998 ✭✭✭✭Cuddlesworth


    Router to client is only vulnerable when 802.11r or a mesh network is in use. Pretty sure most home routers are not using 802.11r. Client to router requires a patch on the host OS.

    The direction in which packets can be decrypted (and possibly forged) depends on the handshake being attacked. Simplified, when attacking the 4-way handshake, we can decrypt (and forge) packets sent by the client. When attacking the Fast BSS Transition (FT) handshake, we can decrypt (and forge) packets sent towards the client. Finally, most of our attacks also allow the replay of unicast, broadcast, and multicast frames. For further details, see Section 6 of our research paper.


Advertisement