Are there any tools that can detect if one’s AP or phone suffer from this vulnerability?
Announced at the RSA conference in SF.
Associated whitepaper and
So, it seems that the vulnerability can be triggered by just sending a deauth frame and then listening for data frames and trying to decrypt them using a zero temporal key. This is particularly interesting if both AP and client are vulnerable.
Anyone here working with these chips that can provide an estimation of how big the Tx buffers can get? Maybe this can be combined with RTS/CTS frames to guarantee that Tx buffer is filled to the maximum.