WPA3 Wi-Fi Standard Affected by New Dragonblood Vulnerabilities
#1
Quote:Security researchers discovered new vulnerabilities in the WPA3-Personal protocol which allow potential attackers to crack Wi-Fi network passwords and get access to the encrypted network traffic exchanged between the connected devices.
 
According to a press release from the Wi-Fi Alliance, the devices impacted by these security vulnerabilities in the WPA3 Wi-Fi standard "allow collection of side channel information on a device running an attacker’s software, do not properly implement certain cryptographic operations, or use unsuitable cryptographic elements."
 
WPA3 uses Wi-Fi Device Provisioning Protocol (DPP) instead of shared passwords to sign up new devices to the network, a protocol which allows users to scan QR codes or NFC tags to log devices onto the wireless network. Additionally, unlike WPA2, all network traffic will be encrypted after connecting to a network which uses WPA3 WiFi Security.
 
The WPA3-Personal protocol replaces the Pre-shared Key (PSK) in WPA2-Personal with Simultaneous Authentication of Equals (SAE) to provide more robust password-based authentication.

SOURCE: https://www.bleepingcomputer.com/news/se...abilities/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
CrystalDiskInfo 9.9.1 [2026/05/23]
9.9.1 ​ Improve...harlan4096 — 09:40
Vivaldi 8.0 Build 4033.34
Vivaldi 8.0 Build ...harlan4096 — 09:37
K-Lite Codec Pack 19.7.0 / 19.7.1 Update
Changes in 19.7.0:...harlan4096 — 07:19
Sophos Home for Windows 2025.2
Applies to: Sophos...harlan4096 — 07:15
Vivaldi 8.0 Build 4033.28
Vivaldi 8.0 Build ...harlan4096 — 07:12

[-]
Birthdays
Today's Birthdays
avatar (46)Joanna4589
Upcoming Birthdays
avatar (39)axuben
avatar (40)ihijudu

[-]
Online Staff
There are no staff members currently online.

>