Wireless Driver Vulnerabilities



There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on this noting that the download is a whopping 129MB.


If that’s not enough to raise your concern over the security of your driver installs…. Brian Krebs is reporting on the prospects of hijacking a macbook in 60 seconds. The exploit is possible due to a flaw in the wireless driver on the macbook. This is coming from a Black Hat presentation later today. They chose a Mac mainly because Mac users have a smug sense of invincibility and pointed out that they found similar flaws in other wireless chipset drivers.

Now, I know there will be quite a few people looking for the OFF switch for their wireless radio. (My preference is OFF by default and then switch ON when you choose to…)

If there is some good news in this, it is that of all the above issues, none seem to be in the process of being actively exploited. That much said, keep an eye out for driver updates for your wireless cards as they are certainly part of the “software stack” that could be exploited. The other lesson here is that NO system/OS is invulnerable. ALL OS’es need security updates to maintain a good security baseline.

Update – 9:49PM EDT–

The video of the presentation is now at the above link on hijacking a Macbook in 60 seconds. Of course it was taped so as not to give anyone at the conference a chance to sniff the wireless traffic and dissect what the attack specifically does. They’re trying to give the driver vendors the upper hand here.

Also, there’s more coverage here and likely will be a flood of coverage as many people discover that having their laptops with wireless on all the time is potentially a problem…. surprise…. This looks like the kind of big splash story that MAYBE can wake a few people up to the risks involved with wireless.

–update 8/3/06 11:30 AM EDT–

f-secure has an update with regards to the centrino driver download…. They’ve run into some problems with the update …

on one machine the toggling on/off of the Wi-Fi radio leads to a maximum connection time of 5 minutes. Booting with the radio on to begin with works fine.

Also in some cases the Intel Proset wireless manager forgets favorite networks and WEP/WPA keys.

I’ve also seen A LOT of people that are very skeptical of the claims made in the video. Some posting comments over on slashdot seem to think that they HAD to use a third party card with a THIRD PARTY driver to make it work. According to THIS security fix post it sounds as though the problem was not illustrated with the macbooks built in wireless due to pressure from Apple (Apple hadn’t addressed the issue yet.) According to the presenters the default Macbook wireless drivers ARE VULNERABLE TO THE SAME ISSUE. Also, it the concern over doing the presentation live is re-stated.

I think what comes across is that the point of the demonstration was that multiple wireless card driver sets arevulnerable to exploit. Typically drivers may not get the same kind of scrutiny that core OS software MAY get (or the kind of scrutiny server applications may get.)

Related Posts

Blog Traffic Exchange Related Posts
  • The security of remote tech support (ultravnc sc or x11vnc with wrapper script) Well, I've got a nice way of doing "easy" one click (or one cut and paste) light desktop support for windows or linux, one uses ultravnc sc, the other uses x11vnc with a special wrapper script. So, what security flaws are there in this process? Well, for starters, I see......
  • Remote Tech Support using VNC (Ultravnc SC and x11vnc+wrapper script) Ok, some time back I'd done a writeup on UltraVNC SC, which is a nice customizable (windows version) VNC server that essentially let's someone doing remote support build their own downloadable .exe that runs and automatically tries to make a direct connection to a "listening" vnc viewer. It's good for......
  • Fasten your seatbelts - Browser vulnerability a day to be announced in July I hope there aren't too many browser developers that have planned on taking July off..... I ran across browserfun.blogspot.com where it is planned to release information on a web browser vulnerability EACH DAY for the month of July. This comes to us from HD Moore of Metasploit. Judging from This......
Blog Traffic Exchange Related Websites
  • Tech Support - Funny Video Series While surfing through Youtube, I stumbled across this fun-filled tech support video series. All of the videos are sure to give you good amount of chuckle. I liked all of them, but first one is my favorite. Surely a stress buster after a bad day in office :) Enjoy! Tech......
  • Steadfast Finances was Hacked, Now Restored. (Thanks HostGator!) Last week, several lines of "seemingly malicious code" found its way into SF's theme. This prompted Google, Firefox, Google Chrome and even Twitter, to quickly label this blog as a "Reported Attack Site". If you happened to visit SF from the RSS feed, the email subscriber list, or basically clicked......
  • Wireless HD Video Transmitter Receiver [/caption] If you hate messy cables and wired connections, you are into the right page. Yes, i am speaking about the Wireless HD video transmitter and receiver. Its the best choice, a product which cleans wired space on your home or office. When it comes to remoteness, there are not......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “Wireless Driver Vulnerabilities”

  1. Mac Wireless driver Security vulnerability revisited-- Avery J. Parker - Web site hosting and computer service Says:


    [...] A couple weeks ago the hot story was about the demonstration of a vulnerability in a 3rd party wireless card driver on a Mac. The individuals that demonstrated the vulnerability (in a video taped presentation) also claimed that many wireless drivers were vulnerable to this same flaw and it included the MacBook native drivers (among others.) There was immediate controversy over the fact it was a video demo. I thought their explanation for that was reasonable. (They didn’t want to give a room full of crackers a chance to sniff the wireless traffic and get TOO much detail on the exploit before vendors had a good chance to give updates.) Well… at this point it sounds like among other things, they have not yet demonstrated to Apple an effective use of this exploit against the wireless drivers on the macbook. [...]


Switch to our mobile site