FragAttacks, jerin lahani a cikin daidaitaccen Wi-Fi wanda ke shafar miliyoyin na'urori

Kwanan nan bayani game da rashin lafiyar 12 an bayyana waɗanda aka gano a ƙarƙashin lambar "FragAttacks" shafi na'urorin mara waya daban-daban kuma suna rufe kusan dukkan katunan mara waya da wuraren samun damar amfani, na na'urori 75 da aka gwada, kowanne ya shafa aƙalla ɗayan hanyoyin kai harin.

Matsalolin sun kasu kashi biyu: An gano raunin 3 kai tsaye a cikin ƙa'idodin Wi-Fi kuma sun rufe dukkan na'urori waɗanda ke goyan bayan ƙa'idodin IEEE 802.11 na yanzu (batutuwa an bi su tun 1997).

Raunin 9 yana nuni zuwa kwari da lahani a cikin takamaiman aiwatarwar tarin mara waya. Babban haɗari shine rukuni na biyu, tunda ƙungiyar kai hare-hare akan kurakurai a cikin ƙa'idodin na buƙatar takamaiman al'amuran ko aiwatar da wasu ayyuka daga wanda aka azabtar.

Duk yanayin rauni ya bayyana ba tare da yin amfani da ladabi ba don tabbatar da tsaro na Wi-Fi, koda lokacin amfani da WPA3, saboda yawancin hanyoyin da aka gano na ba da izini ga mai kai hari don aiwatar da maye gurbin L2 a kan hanyar sadarwar da aka kiyaye, yana ba da damar toshe zirga-zirgar wanda aka azabtar.

Bayyanar da martani na DNS don jagorantar mai amfani zuwa ga maharin an ambaci shi azaman mafi kyawun yanayin harin. Hakanan yana ba da misali na amfani da rauni don ƙetare mai fassarar adireshin a kan na'ura mai ba da hanya tsakanin hanyoyin sadarwa da samar da hanyar kai tsaye zuwa na'urar a kan hanyar sadarwar gida ko ƙetare takunkumin katangar wuta.

Kashi na biyu na raunin yanayin, wanda ke da alaƙa da aiki da guntun firam, yana ba ka damar cire bayanai game da zirga-zirga a cikin hanyar sadarwar mara waya kuma ka tsoma bayanan mai amfani da aka watsa ba tare da yin amfani da ɓoye ba.

Wani mai bincike ya shirya zanga-zangar da ke nuna yadda za a iya amfani da rauni don kutsawa kalmar sirri da aka yada yayin shiga yanar gizo kan HTTP ba tare da boye-boye ba, hakanan ya nuna yadda za a kai hari ga toshe mai kaifin baki, wanda ake sarrafa shi ta hanyar Wi-Fi, kuma a yi amfani da shi don ci gaba da kai harin tsofaffin na'urori a kan hanyar sadarwar cikin gida wadanda ke da raunin rashin dacewa (alal misali, yana yiwuwa a kaiwa farmaki kan kwamfutar Windows 7 ba tare da sabuntawa akan hanyar sadarwar cikin ba ta hanyar NAT traversal).

Don amfani da raunin yanayi, mai kai hari dole ne ya kasance tsakanin kewayon na'urar mara waya da nufin aika saiti na musamman wanda aka zana ga wanda aka cutar.

Batutuwan suna shafar na'urorin abokin ciniki da katunan mara wayakazalika da wuraren samun Wi-Fi da kuma magudanar hanya. Gabaɗaya, HTTPS a haɗe tare da ɓoye ɓoyayyen zirga-zirgar DNS ta amfani da DNS akan TLS ko DNS akan HTTPS sun isa matsayin matattara don kariya. VPN kuma ya dace don kariya.

Mafi haɗari sune rauni guda huɗu a cikin aiwatar da na'urori marasa waya wadanda ke ba da damar hanyoyin marasa amfani don samun nasarar maye gurbin fuskokinsu marasa rufin asiri:

  • Ularfafawa CVE-2020-26140 da kuma CVE-2020-26143 ba da izinin tsara abubuwa akan wasu wuraren samun dama da katunan mara waya akan Linux, Windows, da FreeBSD.
  • Ularfafawa CVE-2020-26145 ba da damar ɓoye ɓarkewar rafin da ba a ɓoye ba don a kula da shi azaman cikakkun abubuwa a kan macOS, iOS, da FreeBSD da NetBSD.
  • Ularfafawa CVE-2020-26144 yana ba da damar sarrafa abubuwanda ba a sake ruɗu ba wanda aka sake haɗa Frames masu A-MSDU tare da EtherType EAPOL akan Huawei Y6, Nexus 5X, FreeBSD da LANCOM AP.

Sauran raunin aiwatarwar suna da alaƙa da matsaloli a cikin ma'amala ginshiƙai ginshiƙai:

  • BAKU-2020-26139: yana ba da damar tura sakonnin EAPOL da aka aika ta wanda ba a tantance shi ba (yana shafar maki 2/4 da aka tabbatar, NetBSD da FreeBSD mafita).
  • CVE-2020-26146- Yana baka damar sake tattara gutsuttsarin ɓaɓɓake ba tare da duba tsarin lambobin jerin ba.
  • CVE-2020-26147- Yana ba da damar sake haɗuwa da ɓayayyun ɓoyayyun ɓoyayyun ɓoyayyun ɓaɓɓatse
  • CVE-2020-26142: Yana ba da izini a kula da ginshiƙan ginshiƙai azaman cikakkun madafan hoto (yana shafar samfurin OpenBSD da ESP12-F mara waya).
  • CVE-2020-26141: Bacewar TKIP MIC bace don ginshiƙan ginshiƙai.

Daga cikin sauran matsalolin da aka gano:

  • BAKU-2020-24588: Wani mummunan harin da aka bawa mai amfani da shi zuwa mummunan uwar garken DNS ko ƙetarewar NAT an ambace shi azaman misalin harin.
  • CVE-2020-245870- Haɗin maɓallin haɗi mai mahimmanci (sake yarda da ɓoyayyen ɓoyayyen ɓoyayyen tare da mabuɗan mabanbanta a cikin WPA, WPA2, WPA3 da WEP). Harin ya ba ka damar ƙayyade bayanan da abokin ciniki ya aiko, alal misali, ƙayyade abubuwan da ke cikin kuki yayin isa ta hanyar HTTP.
  • CVE-2020-24586 - Attack Cache Attack (mizanin da ke rufe WPA, WPA2, WPA3 da WEP ba sa buƙatar cire gutsutsuren da suka riga suka zauna a cikin cache bayan sabon haɗi zuwa cibiyar sadarwar). Yana ba da damar gano bayanan da abokin harka ya aiko da aiwatar da madadin bayanan su.

Idan kanaso ka kara sani game dashi, zaka iya tuntuba mahada mai zuwa.


Bar tsokaci

Your email address ba za a buga. Bukata filayen suna alama da *

*

*

  1. Wanda ke da alhakin bayanan: Miguel Ángel Gatón
  2. Manufar bayanan: Sarrafa SPAM, sarrafa sharhi.
  3. Halacci: Yarda da yarda
  4. Sadarwar bayanan: Ba za a sanar da wasu bayanan ga wasu kamfanoni ba sai ta hanyar wajibcin doka.
  5. Ajiye bayanai: Bayanin yanar gizo wanda Occentus Networks (EU) suka dauki nauyi
  6. Hakkoki: A kowane lokaci zaka iyakance, dawo da share bayanan ka.