Information:

The Wi-Fi encryption standard WPA3 was adopted in June 2018 as a supplement to the existing WPA2 standard.

The WPA3 implementation, as used by LANCOM Systems among others, features the WPA2/WPA3 mixed mode. This ensures that not only WPA3- Personal enabled Wi-Fi clients are able to operate the latest Wi-Fi, but also that clients that only support the WPA2 standard are also able to access the Wi-Fi using WPA2 encryption.

However, this mixed mode is vulnerable to so-called downgrade & dictionary attacks:

If a wireless client and a (LANCOM) access point use the WPA2/WPA3 mixed mode, a potential attacker could set up a rogue access point that supports WPA2 only. Here, even WPA3-enabled wireless clients are forced to connect using WPA2 with the potential threat from dictionary attacks.

Although the Wi-Fi client would detect the “downgrade to WPA2 attack”, this is already too late if the legitimate (LANCOM) access point sends message 3 of the 4-way handshake. The 4-way handshake messages that were exchanged before the downgrade was detected can be misused to launch a dictionary attack on the network.

This is a vulnerability in the standard itself, and is not manufacturer-specific. The described behavior can ultimately only be resolved by further development of WPA3-Personal™.


What can I do to avoid being attacked?


The vulnerabilities were discovered by security researcher Mathy Vanhoef and described in his paper “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”.