Information Security all in one place!

Posts tagged “Wi-Fi

Cisco Releases Multiple Security Advisories


Cisco has released six security advisories to address vulnerabilities affecting the following products:

* Cius Wifi devices running Cius Software Version 9.2(1) SR1 and prior

* Cisco Unified Communications Manager Software versions 6.x, 7.x, and 8.x

* Cisco Business Edition 3000, 5000, and 6000

* Cisco Unity Connection 7.1 and prior

* Cisco 2000, 2100, 2500, 4100, 4400, and 5500 Series Wireless LAN Controllers (WLCs)

* Cisco 500 Series Wireless Express Mobility Controllers

* Cisco Wireless Services Modules (WiSM) and (WiSM version 2)

* Cisco NME-AIR-WLC and NM-AIR-WLC Modules for Integrated Services Routers (ISRs)

* Cisco Catalyst 3750G Integrated WLC

* Cisco Flex 7500 Series Cloud Controllers

* Control, Expressway, and Starter Pack Express variants of Cisco

TelePresence Video Communication Server

* Cisco SRP 521W, 526W, and 527W

* Cisco SRP 521W-U, 526W-U, and 527W-U

* Cisco SRP 541W, 546W, and 547W

These vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, operate with escalated privileges and bypass security restrictions.


BYOD Control: Aruba brings it together with ClearPass


Aruba Delivers BYOD Control with ClearPass

The bring-your-own-device (BYOD) era is booming, while BYOD delivers some freedom to users and is great don’t get me wrong, however. It is still absolutely critical that companies reachthe same degree of protection,  and control that corporate owned devices also receive to these devices. It has to be thought of as a wired device, in my opinion.

Networking vendor Aruba is now debuting a solution for BYOD, built on Linux and leveraging the open source FreeRADIUS access controlsolution to help return control to enterprises.

English: offical logo of Aruba Networks

“ClearPass provides a networking solution for BYOD to address all of the majoroperating systems and any networking vendor’s network architecture,” Robert Fenstermacher, director of Product Marketing at Aruba, told InternetNews.com. “It can act as a single point of policy control across all wired, wireless and remote infrastructure for a global organization.”

More from ENP: http://www.enterprisenetworkingplanet.com/netsysm/aruba-delivers-byod-control-with-clearpass.html


5 Steps for analyzing your WLAN


Assessing Your Wireless Network Security

Wireless network penetration testing—using tools and processes to scan the network environment for vulnerabilities—helps refine an enterprise’s security policy, identify vulnerabilities, and ensure that the security implementation actually provides the protection that the enterprise requires and expects. Regularly performing penetration tests helps enterprises uncover WLAN network security weaknesses that can lead to data or equipment being compromised or
destroyed by exploits (attacks on a network, usually by “exploiting” a vulnerability of the system),Trojans (viruses), denial of service attacks, and other intrusions.

Here is a great article I was reading on Cisco blogs and found it useful to post. Enjoy!

5 Steps for Assessing Your Wireless Network Security

Sampa Choudhuri – Network security is a never-ending task; it requires ongoing vigilance. Securing your wireless network can be particularly tricky because unauthorized users can quietly sneak onto your network, unseen and possibly undetected. To keep your WLAN secure, it’s important to stay on top of new wireless vulnerabilities. By regularly performing a vulnerability assessment on your wireless network, you can identify and close any security holes before a hacker can slip through them.

With a WLAN vulnerability assessment, you’re figuring out what your wireless network looks like to the outside world on the Internet. Is there an easy way in to your network? Can unauthorized devices attach themselves to your network? A WLAN vulnerability assessment can answer these questions—and more.

Teaser:

1. Discover wireless devices on your network. You need to know everything about each wireless device that accesses your network, including wireless routers and wireless access points(WAPs) as well as laptops and other mobile devices. The scanner will look for active traffic in both the 2.4GHz and 5GHz bands of your 802.11n wireless network. Then, document all the data you collect from the scanner about the wireless devices on your network, including each device’s location and owner.

English: A Linksys wireless-G router.

2. Hunt down rogue devices. Rogue devices are wireless devices, such as an access point, that should not be on your network. They should be considered dangerous to your network security and dealt with right away. Take your list of devices from the previous step and compare it to your known inventory of devices. Any equipment you don’t recognize should be blocked from network access immediately. Use the vulnerability scanner to also check for activity on any wireless bands or channels you don’t usually use.

Read the 5 Steps here:

http://blogs.cisco.com/smallbusiness/5-steps-for-assessing-your-wireless-network-security/


802.1X password exploit on many HTC Android devices


802.1X password exploit on many HTC Android devices

Please read carefully:

There is an issue in certain HTC builds of Android that can expose the
user’s 802.1X Wi-Fi credentials to any program with basic WI-FI
permissions.  When this is paired with the Internet access
permissions, which most applications have, an application could easily
send all stored Wi-Fi network credentials (user names, passwords, and
SSID information) to a remote server.  This exploit exposes
enterprise-privileged credentials in a manner that allows targeted
exploitation.

Severity: Critical

Device Vendor : HTC

Confirmed Devices with vulnerability:

Desire HD  (both “ace” and “spade” board revisions) – Versions FRG83D, GRI40
Glacier – Version FRG83
Droid Incredible – Version FRF91
Thunderbolt 4G – Version FRG83D
Sensation Z710e – Version GRI40
Sensation 4G – Version GRI40

English: Wordmark of HTC. Trademarked by HTC.

Image via Wikipedia

Desire S – Version GRI40
EVO 3D – Version GRI40
EVO 4G – Version GRI40

Vulnerability Details:  

There is an issue in certain HTC builds of Android that can expose the
user’s 802.1X password to any program with the
“android.permission.ACCESS_WIFI_STATE” permission. When paired with
the “android.permission.INTERNET” permission, an app could easily send
user names and passwords to a remote server for collection. In
addition, if the SSID is an identifiable SSID (“Sample University” or
“Enterprise XYZ”), this issue exposes enterprise-privileged
credentials in a manner that allows targeted exploitation.

Although the published Android APIs don’t provide access to the 802.1X
settings, it is possible to view the settings with the .toString()
member of the WifiConfiguration class. The resulting output will look
something like this:

* ID: 2 SSID: “ct” BSSID: null PRIO: 16
KeyMgmt: WPA_EAP IEEE8021X Protocols: WPA RSN
AuthAlgorithms:
PairwiseCiphers: CCMP
GroupCiphers: WEP40 WEP104 TKIP CCMP
PSK:
eap: PEAP
phase2: auth=MSCHAPV2
identity: [Your User Name]
anonymous_identity:
password:
client_cert:
private_key:
ca_cert: keystore://CACERT_ct

On most Android devices, the password field is either left blank, or
simply populated with a “*” to indicate that a password is present.
However, on affected HTC devices, the password field contains the
actual user password in clear text.

This is sample output from a Sprint EVO running Android 2.3.3:
* ID: 0 SSID: “wpa2eap” BSSID: null PRIO: 21
KeyMgmt: WPA_EAP IEEE8021X Protocols: WPA RSN
AuthAlgorithms:
PairwiseCiphers: CCMP
GroupCiphers: WEP40 WEP104 TKIP CCMP
PSK:
eap: TTLS
phase2: auth=PAP
identity: test
anonymous_identity:
password: test
client_cert:
private_key:
ca_cert: keystore://CACERT_wpa2eap

Updating and more help can be found here:

Google has made changes to the Android code to help better
protect the credential store and HTC has released updates for all
currently supported phone and side-loads for all non-supported phone.

Android Market

Image via Wikipedia

Customer with affected versions can find information from HTC about
updating their phone at: http://www.htc.com/www/help/

Google has also done a code scan of every application currently in the
Android Market and there are no applications currently exploiting this
vulnerability.

Additional Contacts and Credit:

Credit: Chris Hessing from The Open1X Group (http://www.open1x.org) who is
currently working on Android, iOS, Windows, Mac OSX, and Linux 802.1X
tools for Cloudpath Networks (http://www.cloudpath.net/) discovered
this password exploit.

Contacts:

Chris Hessing
Senior Engineer, Cloudpath Networks (chris.hessing@cloudpath.net)
Chief Architect, Open1X Group (chris@open1x.org)
Bret Jordan CISSP
Senior Security Architect, Open1X Group (jordan@open1x.org)


Gigabit Wi-Fi Panel From the Wi-Fi Symposium



The Wi-Fi Mobility Symposium panelists discussed the possibilities for gigabit Wi-Fi, including practical applications and questions about the relevance of technologies like 802.11ac and 802.11ad. This session was introduced by Marcus Burton and moderated by Marcus and Andrew von Nagy. It features the following panelists (L-R):

Video Posted Here: http://vimeo.com/35706897

Speed is king. The desire for in-home video and multimedia distribution is growing as consumers increasingly adopt more dynamic time-shifted and location-shifted media consumption behaviors. Wireless networking is the preferred method due to its ease-of-use, ubiquity, and low-cost compared to wired network installation. Two separate standards are being developed to enable higher capacity and support for multiple high-def video streams: 802.11ac provides gigabit speeds for multi-room access and ensures backward compatibility with existing Wi-Fi equipment in the 5GHz frequency band, while 802.11ad provides multi-gigabit speeds at much shorter ranges but does not provide compatibility due to operation in the much higher 60GHz frequency range. Symposium panelists will present the benefits and development progress for both standards, and discuss use-cases within the home as well as enterprise environments.

 

Original Post: http://techfieldday.com/2012/gigabit-wi-fi-panel-wi-fi-symposium/


Windows 8 mobile broadband friendly…..


CyberLink PowerDVD 9

Microsoft to make easier management of mobile connections:

Microsoft is releasing new features in Windows 8 that make it easier to connect to non-Wi-Fi mobile broadband networks, and to manage all wireless connectivity options. The move reflects the growing popularity of mobile broadband and may correct a glaring weakness in Windows-lack of native support for non-Wi-Fi networks. That weakness has meant that Windows users had to find and install their own device driversfor mobile broadband connections.

Service mark for GSMA mobile broadband

Image via Wikipedia

That challenge in turn likely meant that many users with mobile broadband devices with Windows 7 and previous software versions were not taking advantage of the increasing presence of mobile broadband coverage. Windows 8 includes a dedicated, native mobile broadband driver that Microsoft says already complies with many different mobile devices.

The company also said the latest version of Windows allows easier switching between mobile and Wi-Fi networks, a feature that could become a must-have at a time when mobile data users are seeing more reason to switch to Wi-Fi coverage to save data plan usage when they can. User can set their own network connection priorities, and as Windows learns their preferences, it can speed up re-connection to these networks when coming out of stand-by mode.
Windows 8 also includes a console for managing all mobile broadband device connection settings and radios. Within this management console is the ability to track data usage on mobile network so that users know how close they are getting to their plan limits. It sounds like Microsoft is not only acknowledging the now pervasive nature of mobile broadband, but also the fact that connecting to these networks comes with its own set of limitations.

Read More Here http://tinyurl.com/7bl6c4n

driver_updater.gif


NPD: Wi-Fi set to conquer home entertainment devices


BannerFans.com

Wi-Fi is now considered a “must-have” feature for video entertainment devices for the home, according to a new report from NPD In-Stat. The research firm said it expects entertainment devices with Wi-Fi integrated in them to reach 600 million shipments by 2015. Those devices include everything from Blu-ray players to stereo speakers to Wi-Fi-enabled TVs. And in this case, Wi-Fi means 802.11b/g, 802.11n and the new, upstart 802.11ac. NPD In-Stat said more than 28 million Wi-Fi-enabled Blu-ray players will ship in 2013.

Wi-Fi Alliance logo

Image via Wikipedia

In-Stat’s vice president of research, Frank Dickson, asserts in the report that this is because Wi-Fi has evolved from an extra feature to a “must-have” function on entertainment devices:

It is important to note though that Wi-Fi is growing from being simply about getting content from a network to devices, to sharing content between devices, as Wi-Fi evolves from being a network-centric connectivity standard to one that enables peer-to-peer connectivity. New innovations such as Wi-Fi Display and Wi-Fi Direct will fundamentally change the way that content is moved and shared in the home.

The report asserts this covers everything from computers (which have had built-in Wi-Fi support for some time now) to Blu-ray players, digital picture frames, and even speaker systems.

Although the report also includes televisions in this regard (and this might definitely be the case in 2015), there are still many consumers out there that are willing to forgo Wi-Fi on televisions — mainly because HDTVs without Internet connectivity are pretty darn cheap these days.

However, as Internet-connected TVs become cheaper to produce and infiltrate the consumer world a bit more, these higher-end screens will likely come down in price as well. Not to mention that content providers (especially ones like Netflix and Hulu along with many TV app developers) will be pushing for and depending upon the sale of as many Wi-Fi-enabled TVs and other home entertainment products as possible.

Read More: http://tinyurl.com/6o9zpnb