Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Wireless Piggybackers Put on Notice

New California law encourages users to lock up WLANs, setting the stage for criminal action against hackers and piggybackers

We've all done it: You're using your laptop in a location without hotspot access. You want onto the Internet, so you start scanning for open wireless LANs. You find one and, regardless of who owns it, you piggyback a ride onto the Web.

Yesterday, the California legislature passed a law (AB 2415) that takes the first steps toward outlawing wireless network piggybacking, as well as hacking into wireless LANs. The bill, which was written by Speaker Fabian Nunez (D-Los Angeles), has been submitted to Gov. Schwarzenegger and is expected to be signed. It will go into effect in Jan. and will apply to devices manufactured after Oct. 1, 2007.

The law will require all manufacturers of wireless access products to put warning labels on their products that remind users to password-protect their WLANs before launching them. The warnings could take place as stickers on wireless routers, notes during installation, or an alert that requires buyers to take action before the device is used.

The new legislation stops short of outlawing wireless piggybacking or hacking, but it points out that a password-protected WLAN is protected under state and federal laws against unauthorized access of computers.

"There is disagreement as to whether it is legal for someone to use another person's WiFi connection to browse the Internet if the owner of the WiFi connection has not put a password on it," the proposed legislation observes. However, both Section 502 of the Calif. penal code and the Federal Computer Fraud and Abuse Act "prohibit the intentional access to a computer without authorization."

In a nutshell, then, the law requires manufacturers to warn WLAN users of the potential for abuse, and to clearly explain to users how to password-protect them. If users take the requisite security steps, and if piggybackers or hackers then break into the WLAN, the interlopers could be subject to criminal prosecution.

The legislation quotes a December 2005 study from the National Cyber Security Alliance, which states that 26 percent of homes have a wireless network, but about 47 percent of those homes failed to encrypt their connection, "a safety precaution needed to protect wireless networks from outside intruders."

Manufacturers will get a lot of leeway in how they present the warnings, which might be anything from stickers plugged into wireless router ports to tags that would have to be read and removed before a wireless access point could be activated. Manufacturers are given an option to put the warning in their configuration software as well.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...