An attacker within range of an affected Wi-Fi device can exploit the vulnerabilities described in the study to inject arbitrary packets. This can potentially allow an attacker to steal user information or conduct unauthorized activities.
Learn more about different FragAttack vulnerabilities:
We’ve completed a full analysis of the attacks on our PIC32MZW1and WINC15x0 Wi-Fi Integrated Circuits (ICs). We found that the devices are vulnerable only to a subset of the attacks as identified in the table below.
Successful exploitation of these vulnerabilities may enable an attacker to use FragAttacks for the purpose of leaking information or data exfiltration. To enact this, the attacker must successfully orchestrate the injection of 802.11 packets, man-in-the-middle attacks and redirection of the device to a malicious server. Achieving this is difficult in practice and the attacks do not allow the bypassing of network layer protections provided by TLS.
MPLAB® Harmony wireless_wifi release versions 3.6.0 and higher provide firmware that is resistant to the FragAttack vulnerabilities disclosed in the table above. If you are using earlier releases than version 3.6.0, we recommend upgrading your applications to the latest wireless_wifi release.
We also recommend designing products with the most secure protocols available, such as:
Firmware and Linux driver versions 15.6 and higher are resistant to the FragAttack vulnerabilities disclosed in the table above. For more information on the download locations of the firmware and driver packages, please refer to the version 15.6 or higher release note. We do not recommend customers use releases below 15.6 and to upgrade both your firmware and Linux driver.
We also recommend designing products with the most secure protocols available, such as:
Firmware versions 19.7.6 and higher are resistant to the FragAttack vulnerabilities disclosed in the table above.
The FragAttack fixes are available as a firmware-only upgrade (compatible with driver versions 19.4.4 and higher). You can download the firmware directly from our website.
Firmware version 19.7.6 is shipped with MPLAB Harmony wireless_wifi release 3.6.0. Products built using this version of the wireless_wifi or higher are already resistant to FragAttacks.
Please refer to the ATWINC15x0 19.7.6 software release notes on the WINC15x0 product page for instructions on upgrading your WINC15x0 platform.
We also recommend designing products with the most secure protocols available, such as:
Firmware versions 1.4.3 and higher are resistant to the FragAttack vulnerabilities disclosed in the table above.
The FragAttack fixes are available as a firmware-only upgrade (compatible with driver versions 1.1 and higher). You can download the firmware directly from our website.
Firmware version 1.4.3 is shipped with MPLAB Harmony wireless_wifi release 3.6.1. Products built using this version of the wireless_wifi or higher are already resistant to FragAttacks.
Please refer to the ATWINC3400 1.4.3 software release notes on the WINC3400 product page for instructions on upgrading your WINC3400 platform.
We also recommend designing products with the most secure protocols available, such as: