A couple of new Wi-Fi authentication bypass vulnerabilities discovered in open source software may expose many enterprise and home networks to attack.
Mathy Vanhoef, a professor at Belgium’s KU Leuven research university, and Heloise Gollier, a KU Leuven student, discovered the vulnerabilities in collaboration with VPN testing company Top10VPN. Vanhoef is well-known for his Wi-Fi security research, which includes attacks such as KRACK, Dragonblood, and FragAttack.
Wpa_supplicant, which supports WPA, WPA2, and WPA3, is available on all Android devices, the majority of Linux devices, and the Chromebook operating system ChromeOS.
Read More: New Wi-Fi Authentication Bypass Flaws Expose Home, Enterprise Networks
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.