WPA3 Vulnerable to Password-Stealing Attacks, Claim Researchers

Advertisement
By Gadgets 360 Staff | Updated: 12 April 2019 12:09 IST
Highlights
  • WPA3’s SAE handshake includes several design flaws
  • WPA3 was unveiled in early 2018, 14 years after WPA2
  • The affected devices are said to be already receiving patches

WPA3, which was released in 2018, was supposed to prevent password-stealing attacks

Wi-Fi Protected Access 3 (WPA3), the next generation wireless security protocol, is affected by several design flaws that make it vulnerable to attacks, researchers have claimed. Released in early 2018, over a decade after WPA2, the WPA3 was touted to be packing several security enhancements but the new revelations show that the security protocol is hardly invulnerable to password partitioning attacks. Wi-Fi Alliance, the industry body that oversees the wireless security protocols and security certification programs, has acknowledged the existence of these vulnerabilities and it says that the device manufacturers have already started releases patches for the problem.

According to a research paper published by Mathy Vanhoef of New York University, Abu Dhabi, and Eyal Ronen of Tel Aviv University, the WPA3's Simultaneous Authentication of Equals (SAE) handshake, commonly known as Dragonfly, is vulnerable to password partitioning attacks, which can be used to recover the password to a Wi-Fi network. The SAE handshake was introduced in WPA3 for the home networks to prevent dictionary attacks but it has been found having both timing and cache-based side-channel vulnerabilities in its password encoding method.

These vulnerabilities, referred to as Dragonblood, allowed the researchers to successfully guess the passwords of wireless networks protected with WPA3 security. The researchers blame the lack of transparency in the creation of the WPA3 standard for these vulnerabilities. To recall, Vanhoef was also credited with finding the KRACK security flaw. WPA2 security was found to be vulnerable to KRACK attacks in October 2017. Major operating system makers like Microsoft, Apple, and Google soon after developed patches for their systems. Notably, KRACK bug was one of reasons why WPA3 was developed. 

Advertisement

“In light of our presented attacks, we believe that WPA3 does not meet the standards of a modern security protocol. Moreover, we believe that our attacks could have been avoided if the Wi-Fi Alliance created the WPA3 certification in a more open manner,” Mathy Vanhoef of New York University, Abu Dhabi, and Eyal Ronen of Tel Aviv University and KU Leuven stated in the research paper.

Advertisement

Following the publication of the research paper, the Wi-Fi Alliance came out and accepted the findings. It also noted that affected device manufacturers are already releasing patches for the same.

“Recently published research identified vulnerabilities in a limited number of early implementations of WPA3-Personal, where those devices allow collection of side channel information on a device running an attacker's software, do not properly implement certain cryptographic operations, or use unsuitable cryptographic elements,” Wi-Fi Alliance said in a statement. “WPA3-Personal is in the early stages of deployment, and the small number of device manufacturers that are affected have already started deploying patches to resolve the issues. These issues can all be mitigated through software updates without any impact on devices' ability to work well together. There is no evidence that these vulnerabilities have been exploited.”

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Amazon Great Indian Festival 2025 Sale Will Begin on This Date
  2. Top OTT Releases of the Week (Sept 1 - Sept 7): Know What to Watch
  3. Flipkart Big Billion Days Sale Date Revealed, Will Compete With Amazon Sale
  4. Vivo X300 Pro Might Not Arrive With Faster Charging Support
  5. Samsung Galaxy S25 FE Launched With Exynos 2400 SoC: See Price
  6. Samsung Launches Galaxy Tab S11 Series With Galaxy AI, These Features
  7. Oppo Reno 14 FS 5G Launches in Select Global Markets With These Features
  8. WhatsApp Could Implement iOS 26's Liquid Glass Across its iPhone App
  9. Huawei Mate XTs Triple Folding Smartphone With Kirin 9020 Chipset Launched
  10. OpenAI Said to Launch Its First AI Chip in 2026 With Broadcom
  1. Amazon Great Indian Festival 2025: Deals on Samsung Galaxy S24 Ultra, iPhone 15, OnePlus 13s Teased Ahead of Sale
  2. Adobe Premiere App for iOS Introduced With Desktop-Like Controls, Generative AI Tools
  3. Motorola G06 to Reportedly Debut With MediaTek Helio G81 Extreme SoC; Check Expected Price, Features
  4. Samsung Galaxy S26 Series Leaked Dummy Images Hint at iPhone-Inspired Design
  5. OpenAI Said to Launch Its First AI Chip in 2026 With Broadcom
  6. Japan’s Financial Services Agency Mulls Crypto Regulation Under FIEA
  7. WhatsApp for iPhone Testing Implementation of Apple’s iOS 26 Liquid Glass in Beta App
  8. iPhone 17 Series Predicted to Outsell iPhone 16 Models With RAM Upgrades, Improved Cameras, and More
  9. ISRO Tests Parachutes for Gaganyaan Crew Module in Key Rocket-Sled Trial
  10. India’s PRATUSH Computer Could Detect Signals From the Universe’s First Stars: Report
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.