That guest network you set up for your neighbors may not be as secure as you think.
See full article...
See full article...
I have a question that I lack the wisdom to know if it's silly or not.
Is there a potential intersection between the hardware capabilities of the cellular-capable satellite mega constellations and WiFi attacks? My understanding is that these satellites use what is essentially a software defined radio, which means they could transmit and receive on pretty much any frequency, with sufficient capability to connect to something as low-power a cell phone (albeit with very low bandwidth). Given this, does the potential exist for interception of and attacks on WiFi traffic, assuming ground density is low enough?
I appreciate that. I am aware. It was more the "good info to know, I have part of the puzzle, but I haven't ever implemented the actual solution of VLANs".If guest devices are on the same subnet as everything else, it sounds like you'd be vulnerable to this. This sounds like spoofing at layers 1 and 2.
Just turning on VLANs doesn't do anything. You have to segment your network. VLANs are a tool that allow you to segment your network without duplicating every switch and AP on your network for each subnet.
Just don't accidentally point your parabolic WiFi bridge up at space and you'll be fine.According to my quick research, Wi-Fi routers use the following power levels depending on the band used:
- 2.4 GHz: about 50–100 mW, i.e. 0.05–0.1 W, with many APs defaulting to 100 mW (20 dBm).
- 5 GHz: about 50–200 mW, i.e. 0.05–0.2 W, with common defaults around 200 mW (23 dBm) on lower channels and higher limits (up to 1 W or more) allowed on some channels in some regions.
- 6 GHz (Wi‑Fi 6E/7): roughly 60–130 mW, i.e. 0.06–0.13 W for low‑power indoor access points, depending on channel width; for example, a 20 MHz channel at the low‑power limit is about 63 mW (18 dBm) and a 40 MHz channel about 126 mW (21 dBm).
As the greatest transmit power of a Wi-Fi router is a little over 1 watt, it is highly doubtful that in the frequency ranges that routers use, 2.4 GHz, 5 GHz, and 6 GHz, that they would have the power to reach a satellite.
A satellite may have the output power to reach a router, but a router would not have the output power to reach a satellite. With such a one-way connection, it does not seem that this exploit would work.
I appreciate that. I am aware. It was more the "good info to know, I have part of the puzzle, but I haven't ever implemented the actual solution of VLANs".
I guess I should add, welp, and now I have a really solid good reason to implement VLANs.
Just pointing it out because it's a common mistake people who just know enough to know the term VLAN make. Networking is magic to most people.I appreciate that. I am aware. It was more the "good info to know, I have part of the puzzle, but I haven't ever implemented the actual solution of VLANs".
I guess I should add, welp, and now I have a really solid good reason to implement VLANs.
[citation needed]Hi folks! Great comments and questions on whether VLAN isolation helps here. The short answer is that VLANs are not a practical barrier -- if your APs advertise more than one SSID (ex: Guest and Work) networks, its implied that those are on different VLANs, and that the WAP itself is enforcing the VLAN segmentation.
Phsyical access, like being able to touch the AP, the switches or cables.What is physical access to Wi-Fi? I mean, yes, you have to be in range of the wifi devices. But that might be having a nearby repeater device outside the premises.
Keeping in mind that this IS about Wi-Fi and not ethernet, but, perhaps your confusion is because of some things the article said about ethernet. If I'm understanding correctly, the references to Ethernet are because, Wi-Fi at a low level, basically is Ethernet over radio, with a few tweaks like SSIDs, and then encryption layered on top of that.
But the very lowest level of the stack, that goes out over the radio waves, isn't encrypted and validated against known keys. So MAC address spoofing can happen, which it sounds like is the basis of this attack - that the malicious device spoofs another device, then forwards traffic as a machine-in-the-middle.
Any traffic that gets decrypted at the router, normally, like DNS, can thus be decrypted by the MITM using the MITM's provided keys, I think is what's being said here. Which is yet another argument to use encrypted DNS.
What we really need, I think, though, is a modern Wi-Fi replacement/updated version that uses strong key-based encryption/authentication at Level 1 of the network stack? Is that the right takeaway here?
Client isolation has always been security theater. Treat any network as untrusted, and don't click through certificate warnings (in fact at work we disable user's ability to bypass cert warnings). This seems like a nothingburger. Your data can always be intercepted at any point along the path.
Haha, I read the paper and the attack only works if you put the guest SSID on the same vlan as the enterprise SSID or the networking equipment. Nobody doing an enterprise network is going to be doing that. Heck, my home network has an isolated vlan for the guest SSID because nobody has ever thought that guest isolation was impervious.
The bit that worries me more, from a home WiFi network perspective, is that I keep my untrusted IoT devices on their own private network, isolated. This attack means that if any of those devices is actually compromised (by a threat actor or by the vendor/manufacturer themselves), it would be possible to use the device to transit to all networks managed by the same router and act as an agent in the middle against all other devices using the router, once discovery is complete.AirSnitch, by contrast, requires that the attacker already have some sort of access to the Wi-Fi network. For many people, that may mean steering clear of public Wi-Fi networks altogether.
I'm sorry I'm having such a hard time explaining this process in a clear way. I just updated the section following the "Stuck in the Middle with You" subhed in an attempt to do better. The attacker intercepts the target's downlink traffic by replacing the target's MAC with the attacker's MAC. This is essentially a classic port stealing attack from the early Ethernet days, except it has been adapted for Wi-Fi. It completes the first half of the MitM.The article seems to claim that the attacker spoofing the victim's MAC address on another radio allows for "bidirectional" MitM, but doesn't explain how. The key in a MitM attack is to be in the middle, between the victim and their network. How does messing with an AP's forwarding table coerce the victim to send their traffic to the attacker? Also as soon as the victim sends any data to the AP that will fix the forwarding table so at best the attacker is going to only see some of the data.
Yes. The broad top-line conclusion of the paper on this topic is:I haven't read the paper (I will if I find some time later today), but this made me go re-read the description of the attack here.
If there wasn't too much lost in the game of telephone, it looks like the attack is MAC spoofing to get the traffic from another client and...that's it? And you're suggesting these APs are happy to send traffic tagged for VLAN100 to a client connected via BSSIS tagged VLAN200?
[The paper:] Specifically, we find that many APs fail to enforce strict
separation between these virtual BSSIDs’ associated ports. We
forge layer-2 frames targeting other clients under the same AP,
and found that all tested APs allow some degree of unintended
switching that violates client isolation between these virtual
BSSIDs.
[The paper:] We introduce novel MitM primitives that break client
isolation, which was commonly believed to protect Wi-Fi
clients from one another, enabling MitM attacks relating
to both uplink and downlink traffic.
If there wasn't too much lost in the game of telephone, it looks like the attack is MAC spoofing to get the traffic from another client and...that's it? And you're suggesting these APs are happy to send traffic tagged for VLAN100 to a client connected via BSSIS tagged VLAN200?
Ahhhh. So, it sounds like I'd really need a guest AP segmented to a VLAN and a separate network AP on the home network AP and not allow the two to comingle wireless traffic at all.It's indicated in the comments here (and has subsequently been added to the article) that the implementation of VLANs is not necessarily a helpful measure (without restricting an access point to a single VLAN):
https://meincmagazine.com/civis/threa...ffices-and-enterprises.1511831/#post-44274656
Despite being up to my neck in it since I was in my teens back in the mid 1990s (yay, I predate wifi!), I won't lie that every once in awhile it feels like magic still. I certainly don't deal with it as a job, just dabbling with my home network. A lot of stuff I worked on in college though. I actually worked with some pre-cert 802.11g stuff. That was BRAND spanking new in our college labs and seemed magical. I actually worked an internship in college to see if it was worthwhile rolling out 2g network connected PDA's to state police officers so they could remotely access state criminal databases while on patrol or on calls.Just pointing it out because it's a common mistake people who just know enough to know the term VLAN make. Networking is magic to most people.
Good time for CTOs to migrate their infrastructure to a ZTNA model. Actually, 5-8 years ago was a good time to do that. Split off service access from network access and ensure it's all encrypted.I’m not sure I agree with the characterization of this attack as “broader but less severe” than WEP hack.
To individual users, probably, but it makes public WiFi a lot scarier than it was yesterday.
But breaking device isolation and WLAN segmentation in corporate config is a very big deal. Suddenly, if your network isn’t configured just the right way in terms of VLANs, “high security” limited access networks are neither. Even without guest networks, there may be networks that ordinary employees aren’t allowed to access.
And corporate hackers tend to be well resourced and determined.
Bad day to be a CTO.
How do we mention HD Moore in the article and not mention that he created Metasploit? Seems like an oversight in the article.Hi folks! Great comments and questions on whether VLAN isolation helps here. The short answer is that VLANs are not a practical barrier -- if your APs advertise more than one SSID (ex: Guest and Work) networks, its implied that those are on different VLANs, and that the WAP itself is enforcing the VLAN segmentation.
The AirSnitch attacks are effectively "physical" layer - an attacker can use shared group keys and the broadcast injection to target a client in any VLAN. The alternative is to limit each WAP to a single VLAN at the switch level, but then you can't use the same physical WAP for multiple SSIDs, and its impractical to deploy multiple WAPs in the same physical space when multi-SSID/VLAN modes are built into the product.
There may be specific devices where AirSnitch can't cross VLANs, but those are likely in the minority here.
I guess I follow this in terms of how a WAN-to-target packet will first reach the attacker by MAC spoofing, then the attacker restores the MAC table and forwards that packet onto the target.I'm sorry I'm having such a hard time explaining this process in a clear way. I just updated the section following the "Stuck in the Middle with You" subhed in an attempt to do better. The attacker intercepts the target's downlink traffic by replacing the target's MAC with the attacker's MAC. This is essentially a classic port stealing attack from the early Ethernet days, except it has been adapted for Wi-Fi. It completes the first half of the MitM.
To make the MitM bidirectional the attacker needs a way to redirect the intercepted frames back to the target. To do this, the attacker restores the MAC > port mapping to the original one, i.e. the one that associated the target's MAC to the port. The attacker does this by sending a ping from a random (i.e. not the attacker's) MAC . This ping must be wrapped in the Group Temporal Key.
Then, the attacker repeats these two steps over and over, in rapid succession. Please also see the diagram that I added.
Does any of this help clarify?
AirSnitch “breaks worldwide Wi-Fi encryption, and it might have the potential to enable advanced cyberattacks,” Xin’an Zhou, the lead author of the research paper, said in an interview. “Advanced attacks can build on our primitives to [perform] cookie stealing, DNS and cache poisoning. Our research physically wiretaps the wire altogether so these sophisticated attacks will work. It’s really a threat to worldwide network security.” Zhou presented his research on Wednesday at the 2026 Network and Distributed System Security Symposium.
A few years ago, I would have agreed. But since then, Starlink and TMobile are cooperating on delivering Satellite service to TMobile phones. Hard to imagine that the RF power output of a cell phone is much over 1 watt to avoid the RF <-> brain cancer thing. Plus cell phone antennas aren't exactly large. Seems those Starlink satellites have some pretty sensitive receivers.According to my quick research, Wi-Fi routers use the following power levels depending on the band used:
- 2.4 GHz: about 50–100 mW, i.e. 0.05–0.1 W, with many APs defaulting to 100 mW (20 dBm).
- 5 GHz: about 50–200 mW, i.e. 0.05–0.2 W, with common defaults around 200 mW (23 dBm) on lower channels and higher limits (up to 1 W or more) allowed on some channels in some regions.
- 6 GHz (Wi‑Fi 6E/7): roughly 60–130 mW, i.e. 0.06–0.13 W for low‑power indoor access points, depending on channel width; for example, a 20 MHz channel at the low‑power limit is about 63 mW (18 dBm) and a 40 MHz channel about 126 mW (21 dBm).
As the greatest transmit power of a Wi-Fi router is a little over 1 watt, it is highly doubtful that in the frequency ranges that routers use, 2.4 GHz, 5 GHz, and 6 GHz, that they would have the power to reach a satellite.
A satellite may have the output power to reach a router, but a router would not have the output power to reach a satellite. With such a one-way connection, it does not seem that this exploit would work.
Yup this was going to be my exact reply as well. I'm just not making that leap to bidirectional; even the diagram added to the article doesn't show any interception the other way. (And just for background, I am very familiar with the IEEE 802.11 standard; I've written hundreds of lines of code to implement WPA-2 handshakes in software.)I guess I follow this in terms of how a WAN-to-target packet will first reach the attacker by MAC spoofing, then the attacker restores the MAC table and forwards that packet onto the target.
But I still don’t understand how this can be used for the reverse direction, target-to-WAN. Does the attacker use the same method to spoof the MAC of the default gateway? (In which case outbound packets for all clients, not just the target, would hit the attacker.)
Honestly it all sounds terribly impractical, if I’m understanding it right. For every single packet in each direction, the attacker needs to spoof the MAC of its intended destination, then restore the MAC table using ICMP?
However the paper mention Vlan on AP as being an efficient defense :WAPs handle VLAN tags (typically by SSID), but not the same way as a physical ethernet switch; there isn't a physical port to lock a client to. The AirSnitch bugs let an attacker stuff traffic into the "port" for a target client. The bidirectional MITM might be trickier to across SSIDs or VLANs, but its likely going to depend on the specific device behavior.
[citation needed]
An explanation? Some account with 5 comments in its history, sounding like an LLM, saying "actually, MAC spoofing can break VLAN isolation... somehow" is not terribly authoritative, sorry.I mean, in this context HD Moore IS the citation!
What more do you want?![]()
The leap to bidirectional, comes when the attacker restores the MAC > port mapping to the original one, i.e. the one that associated the target's MAC to the port. The attacker does this by sending a ping from a random (i.e. not the attacker's) MAC . This ping must be wrapped in the Group Temporal Key.Yup this was going to be my exact reply as well. I'm just not making that leap to bidirectional; even the diagram added to the article doesn't show any interception the other way. (And just for background, I am very familiar with the IEEE 802.11 standard; I've written hundreds of lines of code to implement WPA-2 handshakes in software.)
Military drones loitering at high altitude could do this. I wouldn't worry about the commercial satellite mega constellations, however, unless you have an idea how they can turn wifi hacking into a profit making enterprise.Is there a potential intersection between the hardware capabilities of the cellular-capable satellite mega constellations and WiFi attacks? My understanding is that these satellites use what is essentially a software defined radio, which means they could transmit and receive on pretty much any frequency, with sufficient capability to connect to something as low-power a cell phone (albeit with very low bandwidth). Given this, does the potential exist for interception of and attacks on WiFi traffic, assuming ground density is low enough?
Yeah this is decidedly not a layer 1 attack (which would be something like jamming the radio transmissons or surrounding stuff with a faraday cage). This doesn't work by interfering with/intercepting layer 1 traffic (hell, you can't not intercept layer 1 traffic with wifi, everyone sees all the radio waves), it's strictly a layer 2 and up attack.Phsyical access, like being able to touch the AP, the switches or cables.
But besides that, all this seems to point to MAC Address Spoofing, which is not Layer 1. In the OSI Model, that's Layer 2. Layer 1 is literally the radio waves. It seems the attack utilizes broadcasts to learn the MAC Address of the gateway. Then, using the exploit, spoofs the gateway and so traffic is routed towards the attacker's PC, rather than the actual gateway.
Has nothing really to do with what I was worried about, which is Inter-SSID hopping. Guest Networks are always treated as hacked, and should always be segmented as best you can. If you can use this to hop SSIDs, then that's a worry. You literally cannot encrypt layer 1 though, as that's the physical media. The radio waves, the electricity running down a wire, the laser light in a fibre-optic cable, that's the layer 1. Which is why I was so confused. This isn't exploiting the layer 1, it's technically exploiting the layer 2.
The article mentions Layer 7, so I'm assuming they're referencing the OSI model:
Physical
Data Link
Network
Transport
Session
Presentation
Application
MAC Addresses live in Layer 2, as part of the Ethernet Protocol. This targets the fact APRing reveals the MAC, and does trickery to redirect traffic to the attacker. You literally cannot encrypt the Physical layer, because that's just the raw representation of 1 and 0, be it electricity, radio waves, or light. Hell, sonar/sound could be a layer 1 if you want.
An explanation? Some account with 5 comments in its history, sounding like an LLM, saying "actually, MAC spoofing can break VLAN isolation... somehow" is not terribly authoritative, sorry.
If the network is properly secured—meaning it’s protected by a strong password that’s known only to authorized users—AirSnitch may not be of much value to an attacker.
Maybe we are using different definitions of bidirectional? To me it's 2 directions of packets: server-to-client, and client-to-server.The leap to bidirectional, comes when the attacker restores the MAC > port mapping to the original one, i.e. the one that associated the target's MAC to the port. The attacker does this by sending a ping from a random (i.e. not the attacker's) MAC . This ping must be wrapped in the Group Temporal Key.
Can you help me understand what's unclear about this?
Easy mistake to make. Unlike the author profiles, there's nothing in the user profile establishing it as being linked to the expert cited in the article. And there was no preamble in the comment establishing who they were, or that they were claiming to be the expert cited in the article.Who, you know, just happesn to be a founder of Metasploit and the CEO/Founder of a cybersecurity company. Who commented on this exploit. In this article.
Did you even bother reading the fucking article?
Hi folks! Great comments and questions on whether VLAN isolation helps here.
Edit: Original comment indicated that VLANs didn't help, I had misread the cross-BSSID attack details.
The paper is clear that the inject/MITM is cross-BSSID but not cross-VLAN (assuming the device isolates correctly).
Thanks for the feedback!