Attacks/Breaches

Researchers Put Nail in WEP's Coffin

Already-weak encryption protocol now can be cracked in three seconds

Its first flaws were exposed more than six years ago, but WEP continues to be one of the industry's most popular means of encrypting wireless transmissions. Now German researchers say they've found a hack that might put the flawed protocol down once and for all.

Speaking at a conference in Hamburg, Germany over the weekend, three researchers from the Darmstadt University of Technology demonstrated their ability to extract a WEP encryption key from an intercepted stream of data in about three seconds.

Wired Equivalent Privacy, which was first shown to be insecure when researchers cracked the RC4 key scheduling algorithm in 2001, has been remarkably stubborn in its growth over the years.

In a study conducted last year, security vendor RSA found that roughly 78 percent of all wireless LAN and WiFi systems found in Paris were encrypted with WEP, compared to only 69 percent in the previous year. In London, RSA found that WEP usage increased to 74 percent of all wireless networks in 2006, up from 65 percent in 2005. In New York, 75 percent of networks found used WEP defenses in 2006, up from 62 percent in 2005.

WEP's growth is attributed mostly to its wide use in wireless hardware. Despite a long string of reports demonstrating various ways to crack the code, vendors continue to include it in their systems, and users -- many of whom don't understand its weaknesses -- continue to use it in their everyday wireless communications. WEP is incorporated into the IEEE's 802.11 standards, which makes it standard-issue on most wireless devices.

In a paper presented this weekend, however, Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin made a strong case that users should never employ WEP, even if it is available on their machines.

"While arguably still providing a weak deterrent against casual attackers in the past, the attack described in this paper greatly improves the ease with which the security measure can be broken and will likely define a watershed moment in the arena of practical attacks on wireless networks," the researchers state.

In a nutshell, the paper describes a method for extending the original RC4 vulnerability to the entire WEP protocol, making it possible to extract the 104-bit WEP key from an intercepted data stream using a 1.7 GHz Pentium M processor.

The researchers emphasized that the crack can be done with a relatively low-performance device, and might even be done with a PDA or mobile phone.

But while the Darmstadt researchers discouraged the use of WEP, one vendor announced a method to reduce the vulnerabilities in WEP transmissions. AirDefense last week unveiled its WEP Cloaking Module, a method of enveloping WEP traffic in a stream of dummy data traffic that uses a different key.

"Our technology enables companies to preserve their existing, and often considerable, investment in wireless devices -- even after their security life-span has seemingly expired," says Mike Potts, president and CEO of AirDefense. The cloaking technology, which is offered as part of the AirDefense suite, is available now.

— Tim Wilson, Site Editor, Dark Reading

  • AirDefense Inc.
  • RSA Security Inc. (Nasdaq: EMC) Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Government Shutdown Brings Certificate Lapse Woes
    Curtis Franklin Jr., Senior Editor at Dark Reading,  1/11/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    The Year in Security 2018
    This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
    Flash Poll
    How Enterprises Are Attacking the Cybersecurity Problem
    How Enterprises Are Attacking the Cybersecurity Problem
    Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-6487
    PUBLISHED: 2019-01-18
    TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
    CVE-2018-20735
    PUBLISHED: 2019-01-17
    ** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
    CVE-2019-0624
    PUBLISHED: 2019-01-17
    A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
    CVE-2019-0646
    PUBLISHED: 2019-01-17
    A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
    CVE-2019-0647
    PUBLISHED: 2019-01-17
    An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.