Broadcom chip flaw at the left, select the iPhones vulnerable to eavesdropping of the network, the researchers say

A flaw in the Wi-Fi chips made by Cypress Semicductor and Broadcom left “billis of devices” open to listening to the vulnerability, ArsTechnica the reports today. The flaw has been announced by the researchers at the RSA security cference today, and aly has been corrected by most manufacturers.

The vulnerability affects mainly FullMAC WLAN chips Cyperess and Broadcom. These chips are used in billis of devices, Eset researchers say, including iPhones, iPads, and Macs. The flaw would have allowed to close attackers to “decrypt the sensitive data that is sent the air,” according to the researchers.

Researchers from Eset said:

A spokespers for Apple cfirmed to ArsTechnica that it fixed these vulnerabilities in the October last in the updates for macOS here and iOS and iPadOS here. The affected Apple devices included:

Other devices from Google, Amaz and Samsung were also affected, as were the wireless routers of Asus and Huawei. Here’s how Apple has explained the fix included in macOS 10.15.1:

ArsTechnica has more details the technical aspects of the vulnerability, so make sure you check their coverage. For Apple users, however, there seems to be no reas to worry, as lg as you are using the latest versis of iOS, iPadOS, and macOS your devices.

ESET researchers have discovered a previously unknown vulnerability in Wi-Fi chips and named it KrØØk. This serious default, assigned CVE-2019-15126, cause vulnerable devices to use a zero of the encrypti key to encrypt the part of the user of the communicati. In a successful attack, this allows the adversary to decrypt some of the wireless network packets transmitted by the vulnerability of the device.

Researchers from Eset said:

ESET researchers have discovered a previously unknown vulnerability in Wi-Fi chips and named it KrØØk. This serious default, assigned CVE-2019-15126, cause vulnerable devices to use a zero of the encrypti key to encrypt the part of the user of the communicati. In a successful attack, this allows the adversary to decrypt some of the wireless network packets transmitted by the vulnerability of the device.

We will be happy to hear your thoughts

      Leave a Reply

      AppleiPhonestop - Apple iPhone News and Rumours All Day
      Logo
      Enable registration in settings - general
      Compare items
      • Laptops (0)
      Compare
      0