"New Dragonblood Vulnerabilities Found in Wi-Fi WPA3 Standard"
Earlier this year, security researchers named Mathy Vanhoef and Eyal Ronen uncovered critical design flaws in the Wi-Fi security and authentication standard, Wi-Fi Protected Access 3 (WPA3), which they dubbed Dragonblood vulnerabilities. Vanhoef and Ronen have discovered two new Dragonblood vulnerabilities that impact the WPA3 Protocol. According to the researchers, the exploitation of these vulnerabilities could allow attackers to recover Wi-Fi passwords as well as leak information from the standard's cryptographic operations. The Wi-Fi Alliance is now updating WPA3 to prevent the attacks highlighted by researchers. However, researchers are calling for the Wi-Fi alliance to allow the open-source community to help bolster the security of the standard. This article continues to discuss the impacts of the new Dragonblood vulnerabilities, the response to this discovery, and Wi-Fi Alliance's closed standards development process.
ZDNet reports "New Dragonblood Vulnerabilities Found in Wi-Fi WPA3 Standard"