Decades-Old Flaws Affect Almost Every Wi-Fi Device

The so-called Frag Attack vulnerabilities could let hackers steal data or compromise connected gadgets.
Image may contain Cell Phone Electronics Mobile Phone and Phone
The flaws are difficult to exploit, but nearly every Wi-Fi device since 1997 has at least one of them.Photograph: Peter Dazeley/Getty Images

A set of vulnerabilities in how Wi-Fi is designed and used in practice expose virtually every Wi-Fi-enabled device to some form of attack. A handful of those flaws have been around since the original Wi-Fi standard debuted in 1997. 

The findings, publicly disclosed this week by New York University Abu Dhabi researcher Mathy Vanhoef, show that an attacker within Wi-Fi range of a target network could potentially exfiltrate data from a victim and compromise their devices. But while the sheer scale and scope of the exposure is staggering, many of the attacks would be difficult to carry out in practice, and not all Wi-Fi devices are affected by all of the flaws.

Vanhoef collectively calls the findings “Frag Attack,” short for "fragmentation and aggregation attacks," because the flaws largely relate to subtle issues in how Wi-Fi chops up and reorders data in transit to move information as quickly as possible, then puts that data back together on the other end.

“The fragmentation functionality is normally used to improve the performance of your Wi-Fi network if there’s a lot of background noise,” Vanhoef says. The goal is to split data up into more manageable fragments for transmission that can be efficiently reassembled when they're received. But Vanhoef discovered security weaknesses in the process. “You can cause a receiver to reassemble two fragments that belong to different packets or even store malicious data and combine it with legitimate information,” he says. "Under the right conditions this can be used to exfiltrate data.”

Vanhoef also found a vulnerability that could allow an attacker to inject malformed data and become a “man in the middle” on a network, studying data that passes through to steal information or even take control of other connected devices that have additional vulnerabilities. They would need no special privileges to pull off the hack.

“These design flaws are a concern. Because they’re so widespread, every Wi-Fi device I tested was vulnerable to something,” Vanhoef says. “But on the other hand they're difficult to exploit. I sometimes like to say ‘patch before attacks get better.’”

Vanhoef spent nine months working on coordinated disclosure with numerous internet security bodies and companies across the industry. Microsoft, Samsung, Cisco, Intel, Linksys, Netgear, Eero, and many others have already released patches. There's full list of security advisories and Vanhoef says more fixes will ship in the next few weeks.

Standards bodies and web security groups, including the Wi-Fi Alliance and the Industry Consortium for Advancement of Security on the Internet, released advisories this week urging all Wi-Fi users and network administrators to update their devices if and when patches are available.

Virtually all Wi-Fi devices need fixes or mitigations of some sort, especially routers and other network equipment, which can be targeted to facilitate attacks. But these are exactly the types of devices, for both consumers and businesses, that often don't receive updates, or can't because of concerns about backward compatibility.

“These findings really get to the heart of how Wi-Fi works,” says longtime independent Wi-Fi researcher Jim Palmer, who analyzed the Frag Attack disclosure. “Some of these findings are really freaky, but the attacks are also very complicated to do, it’s not a smash-and-grab thing. And victims have to be in Wi-Fi range—sort of like a blast radius.”

Palmer says that for Wi-Fi specialists, Frag Attack will join a long mental list of vulnerabilities and flaws that need special consideration in real-world deployments. In recent years, Vanhoef also discovered two of the other major Wi-Fi exposures that rise to that level: the Wi-Fi encryption attacks known as KRACK and Dragonblood. As with those findings, Palmer expects that Frag exposures will be around and lurk in devices for decades.

Vanhoef says the most important things you can do to protect yourself are keeping all of your devices updated and watching for the HTTPS web encryption lock in your browser on the pages you visit. Taking those steps will go a long way to protecting you against Frag attacks, which so far have not been spotted in the wild.

While the Frag findings aren't a full-on crisis, Vanhoef and Palmer both emphasized that any vulnerabilities that affect virtually all devices are important. The fact that Wi-Fi is such a ubiquitous feature in computing devices means that any issues with the standard, or how it's implemented, have the potential to affect everything.

“This is some really scary stuff that shouldn’t be happening,” Palmer says, “The way I look at it is you still have a hole in the boat, but if you have enough plugs and patches your boat’s not gonna sink.”


More Great WIRED Stories