CERT-In Advisory
CIAD-2019-0027
Side-channel vulnerabilities in Dragonfly handshake
Original Issue Date: August 12, 2019
Severity Rating: High
Systems Affected
- WPA3 and EAP-pwd based systems
Overview
Side-channel vulnerabilities have been reported in Dragonfly handshake used by Wi-Fi WPA3 standard and EAP-pwd protocol which could be exploited by a remote attacker to bypass security restrictions and obtain sensitive information on a targeted system.
Description
1. Timing-based side-channel vulnerability
(
CVE-2019-13377
)
This vulnerability exists in WPA3's Dragonfly handshake due to flaws in the implementation of Brainpool curves. A remote attacker could exploit this vulnerability through timing attacks against a system running a WPA3 based service. Successful exploitation of this vulnerability could allow a remote attacker to brute-force the password using the information gained from the timing attacks.
2. Information Disclosure vulnerability
(
CVE-2019-13456
)
This vulnerability exists in certain implementations of EAP-pwd protocol which also uses the Dragonfly handshake algorithm. A remote attacker could exploit this vulnerability through timing attacks against a system running the affected service. Successful exploitation of this vulnerability could allow a remote attacker to obtain sensitive information which can be used to further compromise the targeted system.
Solution
- Contact vendor for appropriate updates and mitigation steps.
References
https://eprint.iacr.org/2019/383.pdf
https://wpa3.mathyvanhoef.com
https://www.zdnet.com/article/new-dragonblood-vulnerabilities-found-in-wifi-wpa3-standard/
CVE Name
CVE-2019-13377
CVE-2019-13456
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|