Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords

Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords

One of WPA3’s most promoted changes was its use of “Dragonfly,” a completely overhauled handshake that its architects once said was resistant to the types of password guessing attacks that threatened WPA2 users. A research paper titled Dragonblood: A Security Analysis of WPA3’s SAE Handshake disclosed several vulnerabilities in WPA3 that open users to many of the same attacks that threatened WPA2 users. One last category of vulnerability the researchers discovered leaves WPA3 networks open to denial-of-service attacks that can prevent devices from connecting.

Source: arstechnica.com