KrØØk attack variants impact Qualcomm, MediaTek Wi-Fi chips

silversurfer

Level 72
Verified
Trusted
Content Creator
Malware Hunter
Aug 17, 2014
6,108
Qualcomm and MediaTek Wi-Fi chips were found to have been impacted by new variants of the KrØØk information disclosure vulnerability discovered by ESET researchers Robert Lipovský and Štefan Svorenčík. [...]
Lipovský and Svorenčík discovered new KrØØk variants that have also impacted systems Qualcomm and MediaTek radios used in vehicles, navigation systems, watches, laptops, smartphones, routers, and other devices.

"One of the chips we looked at aside from those from Broadcom and Cypress was by Qualcomm," the researchers explain in a report published today and shared with BleepingComputer earlier this week.
"The vulnerability we discovered (which was assigned CVE-2020-3702) was also triggerable by a disassociation and led to undesirable disclosure of data by transmitting unencrypted data in the place of encrypted data frames – much like with KrØØk."
"We also observed the manifestation of a similar vulnerability (i.e. lack of encryption) on some Wi-Fi chips by MediaTek," including the ASUS RT-AC52U route and the Microsoft Azure Sphere development kit that utilizes the MT3620 microcontroller also used in smart home, commercial, and industrial solutions.
 

SecurityNightmares

Level 37
Verified
Jan 9, 2020
2,661

silversurfer

Level 72
Verified
Trusted
Content Creator
Malware Hunter
Aug 17, 2014
6,108
Update: Added Qualcomm statement.

"Providing technologies that support robust security and privacy is a priority for Qualcomm. We commend the security researchers from ESET for using industry-standard coordinated disclosure practices. Qualcomm has already made mitigations available to OEMs in May 2020, and we encourage end users to update their devices as patches have become available from OEMs." – Qualcomm spokesperson
 

SecurityNightmares

Level 37
Verified
Jan 9, 2020
2,661
Qualcomm make also very good work for securing their hardware with stuff like IOMMU isolation, WiFi Mac address randomization, ..
Of course that's good for privacy too.

also good to see that they always fix problems fast (y)
 
  • Like
Reactions: Correlate

JoyousBudweiser

Level 11
Verified
Aug 22, 2013
538
Not needed
Qualcomm fix that in February
No they did not fix that in feb, because CVE-2020-3702 is reported in 03/03/2020 (in march), Customer Notified Date is 05/13/2020 and it's not completely in the hands of Qualcomm because most Qualcomm Atheros AR7xxx, AR9xxx and QCA9xxx boards are also used in wifi routers too which require the respective manufacturer to update the firmware to fix the bug. So make sure that your wifi routers gets the most up to date firmware ( most wifi router manufacturers never updates their old routers or issues fixes very rarely..and it becomes extremely dangerous to use these kinds of routers)
See August 2020 Security Bulletin | Qualcomm.
Untitled-1.jpg
 
Last edited:
Top