New AirSnitch attack bypasses Wi-Fi client isolation

Researchers have unveiled AirSnitch, a series of attacks that undermine client isolation in Wi-Fi networks, allowing unauthorized communication between devices. The technique exploits low-level network behaviors and affects routers from major manufacturers including Netgear, D-Link, and Cisco. Presented at the 2026 Network and Distributed System Security Symposium, the findings highlight vulnerabilities in home, office, and enterprise setups.

Wi-Fi networks, connecting over 6 billion users worldwide, rely on client isolation to prevent devices from communicating directly with each other, even when encrypted. However, new research demonstrates that AirSnitch attacks can bypass this protection by targeting Layers 1 and 2 of the network stack, leading to cross-layer identity desynchronization.

The attacks enable a full bidirectional man-in-the-middle (MitM) setup, where an attacker can intercept and modify traffic between clients. This works even across different SSIDs or network segments sharing the same access point (AP). Lead researcher Xin’an Zhou stated, “AirSnitch breaks worldwide Wi-Fi encryption, and it might have the potential to enable advanced cyberattacks.” Co-author Mathy Vanhoef clarified that it bypasses client isolation without breaking authentication or encryption itself, noting that users not depending on isolation remain unaffected.

Tested on 11 devices—such as the Netgear Nighthawk x6 R8000, D-Link DIR-3040, and Cisco Catalyst 9130—all proved vulnerable to at least one variant. The technique adapts port stealing from Ethernet to Wi-Fi, allowing attackers with network access to redirect traffic. In enterprise settings, it can defeat RADIUS authentication by spoofing gateways and establishing rogue access points.

Security expert HD Moore described the work as impressive, comparing it to restoring pre-isolation attack surfaces like ARP spoofing. While some router updates address parts of the issue, systemic fixes may require chip-level changes. Potential mitigations include VPNs and zero trust models, though they have limitations. Zhou warned that firewalls and VLANs may not fully protect against expanded threat models, including attacks from the internet.

相关文章

Illustration of a cyber attack on Cisco devices, showing analysts monitoring screens with code and warnings in a dark operations room.
AI 生成的图像

Operation Zero Disco exploits Cisco SNMP flaw for rootkits

由 AI 报道 AI 生成的图像

Cyber threat actors in Operation Zero Disco have exploited a vulnerability in Cisco's SNMP service to install persistent Linux rootkits on network devices. The campaign targets older Cisco switches and uses crafted packets to achieve remote code execution. Trend Micro researchers disclosed the attacks on October 16, 2025, highlighting risks to unpatched systems.

A new security flaw known as Silent Whisper puts billions of WhatsApp and Signal users at risk. Attackers can monitor activity without detection, leading to battery drain and revelation of daily routines. An expert has created a tool that exploits this vulnerability to spy on users undetected.

由 AI 报道

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Security researchers have uncovered a vulnerability called WhisperPair in 17 audio devices using Google's Fast Pair protocol, enabling hackers to access microphones and track locations within Bluetooth range. The flaw affects products from 10 manufacturers, including Sony and Google, and stems from improper implementation of the pairing standard. Google has collaborated with researchers to address the issue, though full fixes depend on hardware partners.

由 AI 报道

New research from Northeastern University reveals vulnerabilities in Tesla's Model 3 and Cybertruck that allow hackers to track vehicles and disrupt communications via wireless systems. The study highlights broader security issues in modern connected cars, which rely on persistent cellular connectivity. Researchers emphasize that these risks extend to most vehicles using similar modem components.

Zyxel has issued a warning about a critical remote code execution (RCE) security flaw that could affect more than a dozen of its routers. The company has addressed a handful of concerning vulnerabilities in its devices. This update comes as part of ongoing efforts to secure networking equipment.

由 AI 报道

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

 

 

 

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝