New Dragonblood vulnerabilities found in WiFi WPA3 standard | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it

Earlier this year in April, two security researchers disclosed details about five vulnerabilities (collectively known as Dragonblood) in the WiFi Alliance's recently launched WPA3 WiFi security and authentication standard.

Yesterday, the same security researchers disclosed two new additional bugs impacting the same standard.

The two researchers -- Mathy Vanhoef and Eyal Ronen -- found these two new bugs in the security recommendations the WiFi Alliance created for equipment vendors in order to mitigate the initial Dragonblood attacks.

Just like the original Dragonblood vulnerabilities from April, these two new ones allow attackers to leak information from WPA3 cryptographic operations and brute-force a WiFi network's password.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=WiFi

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=WPA3

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Dragonblood