New AirSnitch attack bypasses Wi-Fi client isolation

Researchers have unveiled AirSnitch, a series of attacks that undermine client isolation in Wi-Fi networks, allowing unauthorized communication between devices. The technique exploits low-level network behaviors and affects routers from major manufacturers including Netgear, D-Link, and Cisco. Presented at the 2026 Network and Distributed System Security Symposium, the findings highlight vulnerabilities in home, office, and enterprise setups.

Wi-Fi networks, connecting over 6 billion users worldwide, rely on client isolation to prevent devices from communicating directly with each other, even when encrypted. However, new research demonstrates that AirSnitch attacks can bypass this protection by targeting Layers 1 and 2 of the network stack, leading to cross-layer identity desynchronization.

The attacks enable a full bidirectional man-in-the-middle (MitM) setup, where an attacker can intercept and modify traffic between clients. This works even across different SSIDs or network segments sharing the same access point (AP). Lead researcher Xin’an Zhou stated, “AirSnitch breaks worldwide Wi-Fi encryption, and it might have the potential to enable advanced cyberattacks.” Co-author Mathy Vanhoef clarified that it bypasses client isolation without breaking authentication or encryption itself, noting that users not depending on isolation remain unaffected.

Tested on 11 devices—such as the Netgear Nighthawk x6 R8000, D-Link DIR-3040, and Cisco Catalyst 9130—all proved vulnerable to at least one variant. The technique adapts port stealing from Ethernet to Wi-Fi, allowing attackers with network access to redirect traffic. In enterprise settings, it can defeat RADIUS authentication by spoofing gateways and establishing rogue access points.

Security expert HD Moore described the work as impressive, comparing it to restoring pre-isolation attack surfaces like ARP spoofing. While some router updates address parts of the issue, systemic fixes may require chip-level changes. Potential mitigations include VPNs and zero trust models, though they have limitations. Zhou warned that firewalls and VLANs may not fully protect against expanded threat models, including attacks from the internet.

関連記事

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AIによって生成された画像

Researchers discover SSHStalker botnet infecting Linux servers

AIによるレポート AIによって生成された画像

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

One week after the FCC banned sales of new foreign-made Wi-Fi routers over national security risks, new details emerge on implicated cyberattacks and growing criticism of the broad policy's effectiveness.

AIによるレポート

A hacking technique called DarkSword, used by Russian hackers, can compromise iPhones running iOS 18 simply by visiting infected websites. Discovered in the wild, this tool has been deployed in espionage and cybercriminal campaigns to target thousands of devices indiscriminately. It is now available online in a reusable form, risking a large portion of iPhone users worldwide.

New research from ETH Zurich and USI Lugano reveals vulnerabilities in popular password managers, challenging their assurances that servers cannot access user vaults. The study analyzed Bitwarden, Dashlane, and LastPass, identifying ways attackers with server control could steal or modify data, particularly when features like account recovery or sharing are enabled. Companies have begun patching the issues while defending their overall security practices.

AIによるレポート

Windscribe has introduced a new Android beta version of its VPN app featuring native support for AmneziaWG. This update aims to help users bypass deep packet inspection and counter internet censorship in countries like Iran and Russia. The launch addresses ongoing challenges faced by individuals seeking secure online access in restrictive environments.

Security researchers have uncovered critical vulnerabilities in the n8n automation tool. A previously released patch failed to fully address the issues, leaving users exposed. Experts provide guidance on protecting systems amid these discoveries.

AIによるレポート

A straightforward hack enabled the owner of a new DJI Romo robot vacuum to connect with thousands of other devices worldwide. The incident highlights an ongoing security vulnerability in the product. TechRadar reported the details on February 18, 2026.

 

 

 

このウェブサイトはCookieを使用します

サイトを改善するための分析にCookieを使用します。詳細については、プライバシーポリシーをお読みください。
拒否