Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2020-12638 workaround for WPA downgrade attack #7486

Merged
merged 5 commits into from
Jul 26, 2020

Conversation

earlephilhower
Copy link
Collaborator

When connected to an encrypted (WEP/WPA) router, a rogue packet can
cause the ESP8266 WiFi stack to drop to an unecrypted rogue network of
the same SSID.

Handle this by dropping the WiFi connection immediately and reconnecting
to the stored WPA/WEP network requested by the application, whenever the
AUTHMODE changes to OPEN from a secured mode.

https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors
for more details.

When connected to an encrypted (WEP/WPA) router, a rogue packet can
cause the ESP8266 WiFi stack to drop to an unecrypted rogue network of
the same SSID.

Handle this by dropping the WiFi connection immediately and reconnecting
to the stored WPA/WEP network requested by the application, whenever the
AUTHMODE changes to OPEN from a secured mode.

https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors
for more details.
The downgrade event needs to be looked for in the main WiFi event
processing function instead of the callback function (which will only
trigger if the user actually makes a callback themselves).
@s00500
Copy link

s00500 commented Jul 26, 2020

I could confirm that this successfully mitigates an attack as a workaround, hopefully the arduino core can be upgraded to the latest NONOS master and this workaround can be removed in the future

Thanks for the fast response!

@earlephilhower
Copy link
Collaborator Author

Thanks @s00500 !

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants