UCR研究者がWi-Fiのセキュリティ脆弱性を解明(UCR Computer Scientists Reveal Wi-Fi Security Flaws)

2026-02-24 カリフォルニア大学リバーサイド校(UCR)

カリフォルニア大学リバーサイド校(UCR)の研究チームは、Wi-Fiネットワークに設けられている「クライアント分離」機能を回避可能な新たな脆弱性を発見した。研究「AirSnitch」では、同一ネットワーク内の攻撃者が他ユーザーの通信を傍受・改ざんできる可能性を実証。影響は家庭用ルーターだけでなく、WPA3 Enterpriseを採用する大学や企業の高度な無線環境にも及ぶ。原因は共有暗号鍵の仕組みやネットワーク層間の分離不備など構造的問題にあるとされ、単純なソフト更新では十分でない可能性がある。成果はNDSS 2026で発表予定。

<関連情報>

AirSnitch:Wi-Fiネットワークにおけるクライアント分離の謎を解き明かし、解消する AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks

Xin’an Zhou, Juefei Pu, Zhutian Liu, Zhiyun Qian, Zhaowei Tan, Srikanth V. Krishnamurthy, Mathy Vanhoef
Network and Distributed System Security Symposium 2026

UCR研究者がWi-Fiのセキュリティ脆弱性を解明(UCR Computer Scientists Reveal Wi-Fi Security Flaws)

Abstract

To prevent malicious Wi-Fi clients from attacking other clients on the same network, vendors have introduced client isolation, a combination of mechanisms that block direct communication between clients. However, client isolation is not a standardized feature, making its security guarantees unclear.

In this paper, we undertake a structured security analysis of Wi-Fi client isolation and uncover new classes of attacks that bypass this protection. We identify several root causes behind these weaknesses. First, Wi-Fi keys that protect broadcast frames are improperly managed and can be abused to bypass client isolation. Second, isolation is often only enforced at the MAC or IP layer, but not both. Third, weak synchronization of a client’s identity across the network stack allows one to bypass Wi-Fi client isolation at the network layer instead, enabling the interception of uplink and downlink traffic of other clients as well as internal backend devices. Every tested router and network was vulnerable to at least one attack. More broadly, the lack of standardization leads to inconsistent, ad hoc, and often incomplete implementations of isolation across vendors.

Building on these insights, we design and evaluate end-to-end attacks that enable full machine-in-the-middle capabilities in modern Wi-Fi networks. Although client isolation effectively mitigates legacy attacks like ARP spoofing, which has long been considered the only universal method for achieving machine-in-the-middle positioning in local area networks, our attack introduces a general and practical alternative that restores this capability, even in the presence of client isolation.

1604情報ネットワーク
ad
ad
Follow
ad
タイトルとURLをコピーしました