[31933] in bugtraq

home help back first fref pref prev next nref lref last post

Dictionary attack against Cisco's LEAP, Wireless LANs vulnerable

daemon@ATHENA.MIT.EDU (Michael Renzmann)
Fri Oct 3 12:58:42 2003

Message-ID: <3F7D51B9.50807@dylanic.de>
Date: Fri, 03 Oct 2003 12:38:49 +0200
From: Michael Renzmann <security@dylanic.de>
MIME-Version: 1.0
To: bugtraq@securityfocus.com, full-disclosure@lists.netsys.com
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

Hi.

Cisco released a security notice [1] in August about possible dictionary 
attacks against their proprietary LEAP (Lightweight Extensible 
Authentication Protocol, used with 802.1x). But according to 
Computerworld [2] it seems that this information has not been spread 
well enough.

In addition, Unstrung yesterday reported [3] about the demonstration of 
a tool that seems to be able to retrieve valid passwords for LEAP 
protected WLANs within "minutes, even seconds". The tool is not 
available yet, but its author (Joshua Wright from Johnson & Wales 
University) announced "that the tool will be generally available in a 
couple of months".

Those of you who are using LEAP to protect their Wireless LAN should 
take care of a proper password policy and change passwords regularly. 
Cisco provides further information on password selection in their 
advisory ("Available Documentation", last paragraph).

Bye, Mike

[1] 
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a00801aa80f.shtml
[2] 
http://www.computerworld.com/mobiletopics/mobile/story/0,10801,85637,00.html?f=x68
[3] http://www.unstrung.com/document.asp?doc_id=41185


home help back first fref pref prev next nref lref last post