First of all are admitting that your expensive Wi-Fi access point or router is secured? Next, you have to think about it once again, as a flaw found in at least two of the chipsets used by hardware manufacturers. In reply, it opens your Network to hack within seconds. Trust me, it does!
Security, is one of those major issues sits on top of the list of requirements for wireless networking these days, Securing Wi-Fi access points in many ways already come through, and with varying technical difficulty, there’s is no reason to not keep your network safe.
Unless, a security bug leaves your network wide open to hacking, and a cop that only takes seconds time at all to do no less. That’s the situation that an untold number of Wi-Fi routers find themselves in after security firm 0xcite announced its recent, worrying findings.
According to the Swiss security firm, a flaw in the manner some routers handle Wi-Fi Protected Setup, or WPS, leaves them vulnerable to an attack that is not relatively easy to do, but takes only a second to carry out.
In fact, the flaw itself lets attackers (crackers / patchers) generate their own required security PIN offline and ahead of time, which will be easy to gain access simply by providing that PIN when asked by the router. 0xcite claims that some Broadcom chipsets are affected, along with yet another unnamed company who is currently busy in plugging the hole from its side.
Note: The Wi-Fi router hacking in such a way, may be a simple case of improving or simply adding PIN randomization, but we don’t know as much about the underlying issue as the people that matter to. Thanks to RedmondPie!
WPS (Wi-Fi Protected Setup) cracking became that much easier, which allows people to connect devices up to their router merely by tapping a button on the router and inputting a special PIN number on the device. The exploit takes full advantage of the random techniques employed by Braodcom and et al. Notably, the provided WPS code isn’t very random at all.
Although, WPS is aimed at making it easy to connect devices to a Wi-Fi network, but it’s not as secure one as you thought. This hole will need fixing ASAP though, and with router firmware often rarely updated by end users, it’s slightly more laborious process of attempting to derive a WPS key from brute-force guesses.
Guess what! When we’ll be able to draw a line under the issue is unknown. Stay tuned!