Bugtraq mailing list archives
RE: Verizon FIOS (and DSL?) wireless access point insecure default WEP key
From: "Larry Seltzer" <larry () larryseltzer com>
Date: Mon, 29 Sep 2008 11:41:29 -0400
It's WEP. What would it matter if the key were not predictable? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine larry.seltzer () ziffdavisenterprise com -----Original Message----- From: Paul [mailto:paul14075 () gmail com] Sent: Sunday, September 28, 2008 6:03 PM To: wifisec () securityfocus com; bugtraq () securityfocus com Subject: Verizon FIOS (and DSL?) wireless access point insecure default WEP key By default, the 40-bit WEP key for the wireless router provided by Verizon to FiOS (fiber optic) and possibly DSL customers is set to the last 40 bits of the router's 48-bit MAC address. This is significant because the router's MAC address (the MAC address of it's WAN-side ethernet port) is easily discoverable using kismet without even needing to know the WEP key. The MAC will usually be listed by kismet in the list of connected/associated clients (the 'c' key in kismet). You can tell it is the router's MAC because it will have the same first 3 octets as the BSSID (wifi-MAC) but different last 3 octets. This is true for every Actiontec router I've tested. In each case, the MAC was listed by kismet in the list of connected clients, and in every case the WEP key was the last 40 bits of this MAC. Verizon FIOS (and DSL?) access points are detectable due to their predictable default ESSID' which is a 5 character string of random letters and numbers (ie A1BC3 or AB123, etc).
Current thread:
- Verizon FIOS (and DSL?) wireless access point insecure default WEP key Paul (Sep 29)
- RE: Verizon FIOS (and DSL?) wireless access point insecure default WEP key Larry Seltzer (Sep 29)