New WiFi Setup Flaw Allows Easy Router PIN Guessing


    Trailrunner7 writes “There is a newly discovered vulnerability in the WiFi Protected Setup standard that reduces the number of attempts it would take an attacker to brute-force the PIN for a wireless router’s setup process. The flaw results in too much information about the PIN being returned to an attacker and makes the PIN quite weak, affecting the security of millions of WiFi routers and access points. Security researcher Stefan Viehbock discovered the vulnerability (PDF) and reported it to US-CERT. The problem affects a number of vendors’ products, including D-Link, Netgear, Linksys and Buffalo. ‘I noticed a few really bad design decisions which enable an efficient brute force attack, thus effectively breaking the security of pretty much all WPS-enabled Wi-Fi routers. As all of the of the more recent router models come with WPS enabled by default, this affects millions of devices worldwide,’ Viehbock said.”

    Read more of this story at Slashdot.

    Originally posted here:
    New WiFi Setup Flaw Allows Easy Router PIN Guessing


    Please enter your comment!
    Please enter your name here


    This site uses Akismet to reduce spam. Learn how your comment data is processed.