You guys asked me to break out this information instead of posting as comments on the original post.
Here is more updated information on the WPA2 Hole 196 vulnerability now that AirTight has given the demo at BlackHat/Defcon.
Included are quotes and details from me, AirTight, Matthew Gast (Aerohive), Robbie Gill (Aruba), John Pescatore (Gartner), Adam Conway (Aerohive) and Alan Amrod (Xirrus). Although I didn’t intend for him to quote my Southern-isms, they do relay the truth of the matter. Matthew has some great information you can find in other NWW articles on the attack.
Network World article
AirTight defends Wi-Fi WPA2 ‘vulnerability’ claim: A “publicity stunt?” Major threat? Or easily contained?
My wrap up:
- It’s not a big deal
- Attack is very limited and must be conducted by an authenticated user to another user
- Both victim and attacker must be on the same SSID and on the same access point
- Smart WIPS will protect against the attack
- Client isolation (used in most enterprise environments) prevents the attack all together
My original post
Additional comments are at the very bottom.
# # #