- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
SSID Confusion attack
Hi,
I would like to know if Meraki has some taken any steps to mitigate this vulnerability.
We are:
- using WPA2 encryption and not WPA3
- using RADIUS authentication
I hope Meraki will release a patch to mitigate the vulnerability. Does anyone know or shed some light on the steps that Meraki is going to take or is advising the customers ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
What vulnerability? Do you have the CVE?
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
SSID Confusion Attack WiFi Vulnerability (CVE-2023-52424)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This CVE is from 2023, Meraki has probably already released the fix some time ago, as they frequently release new updates.
Have you already contacted support?
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Doubt that Meraki has published a fix for that. The CVE was published this month.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Without knowing exactly what the underlying mechanisms is in this specific CVE, from what I'm reading about it, it's simply an overall design flaw in the 802.11 standard.
It's always been there, and will always be there.
Basically it aims at tricking a user to associate to your malicious and less secure SSID (a honeypot) and eavesdrop on all your traffic.
If you really want to mitigate it, there's an easy fix.
Turn of all your WiFi and Access Points, and cable your devices to the network.
Like what you see? - Give a Kudo ## Did it answer your question? - Mark it as a Solution 🙂
All code examples are provided as is. Responsibility for Code execution lies solely your own.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It's a day old I doubt any vendor has patched it as it's still being analysed.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
There is no public bug or PSIRT for this vulnerability yet, given it's still pretty fresh.
Raise a support ticket for more information as they may already be investigating internally.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @gagan239,
NOTE: I DO NOT KNOW, THE FULL INS AND OUTS OF THIS VULNERABILITY.
That said, Meraki Air Marshal does have some level of mitigation from Rouge SSIDs. See below guide for further details.
https://documentation.meraki.com/MR/Monitoring_and_Reporting/Air_Marshal
Cheers,
Ivan Jukić,
Meraki APJC
If you found this post helpful, please give it kudos. If it solved your problem, click "accept as solution" so that others can benefit from it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Original writeup came out a few weeks ago: https://www.top10vpn.com/research/wifi-vulnerability-ssid/
I wouldn't expect a fix to be released quickly, if at all!
