Connect with us

Hi, what are you looking for?

Tech & Science

New study shows vulnerabilities of guest WiFi networks

The report demonstrates that many commonly available routers are not secure and are vulnerable to cross-router data leaks, arising from malicious attacks. It is common for routers aimed at businesses and consumers to provide two or more network options. For businesses this could be one for employees and one for clients; at home, this offering is typically one for the family and another for o visitors.

While the business or family will seek to connect all of their sensitive smart home and computer devices to their setting, it remains that the router intended for visitors is designed for less sensitive data. These findings come from the Ben Gurion University (BGU) Department of Software and Information Systems Engineering.

These dual settings present vulnerabilities, and more so with the guest functionality. Discussing the concerns with Laboratory Roots, lead researcher Adar Ovadya states: “All of the routers we surveyed regardless of brand or price point were vulnerable to at least some cross-network communication once we used specially crafted network packets.”

He adds that, as a solution: “A hardware-based solution seems to be the safest approach to guaranteeing isolation between secure and non-secure network devices.”

The new research, which has examined the commercial routers, has been presented at the 13th USENIX Workshop on Offensive Technologies (WOOT), which took place in mid-August 2019. The workshop considered a range of topics pertaining to computer security. Each of the vulnerabilities has been made available to the device manufacturers, so that they can begin to initiate, should they opt to, some improvements.

The objective of the study was to address network separation and network isolation in organizations; plus, to consider how such critical components are needed for businesses to maintain their security policy.

The study also shows the existence of varying levels of cross-router covert channels which have the potential to be combined or exploited to control malicious implant or to exfiltrate and steal the data.

These are key findings in terms of how organizations manage data traffic, especially in relation to handling both sensitive data and less sensitive data.

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Entertainment

Actors Corey Cott and McKenzie Kurtz star in "The Heart of Rock and Roll" on Broadway.

World

Iranian Interior Minister Ahmad Vahidi speaks during a press conference in Tehran on March 4, 2024 - Copyright AFP ATTA KENAREArgentina has asked Interpol...

Business

Chinese students at an e-commerce school rehearse selling hijabs and abayas into a smartphone - Copyright AFP Jade GAOJing Xuan TENGDonning hijabs and floor-length...

World

US Secretary of State Antony Blinken waves as he boards his plane at Joint Base Andrews on his way to Beijing - Copyright POOL/AFP...