{"id":40883,"date":"2021-05-14T22:16:00","date_gmt":"2021-05-14T22:16:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/"},"modified":"2021-05-14T22:16:00","modified_gmt":"2021-05-14T22:16:00","slug":"fragattack-flaws-threaten-wi-fi-but-not-too-seriously","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/","title":{"rendered":"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/hacker_hacking_laptop_security_threat_attack_by_undefined_undefined_gettyimages-962366210_2400x1600_cso_nw-100852237-large.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Almost all Wi-Fi is potentially vulnerable to flaws that date back to 1997 when it became commercially available, but even the person who discovered the weaknesses says some of them are difficult to exploit.<\/p>\n<aside class=\"sidebar medium\">\n<h3 class=\"body\">Wi-Fi resources<\/h3>\n<\/aside>\n<p>Mathy Vanhoef, a post-doctoral student at NYU Abu Dhabi, has created attacks\u2014FragAttacks\u2014that take advantage of the vulnerabilities, but in <a href=\"https:\/\/papers.mathyvanhoef.com\/usenix2021.pdf\" rel=\"nofollow\">an academic paper about them<\/a>, says the most widespread vulnerabilities can be exploited only under specific, rare conditions, and require either user interaction or highly unusual configurations to succeed.<\/p>\n<p>Other vulnerabilities\u2014what he calls programming mistakes made by vendors in their Wi-Fi products\u2014are easily exploited.<\/p>\n<p><a href=\"https:\/\/www.fragattacks.com\/\" rel=\"nofollow\">Vanhoef\u2019s website about FragAttacks<\/a> says his exploits can enable attackers within radio range to steal user information or attack devices on users networks. The flaws fall into two categories: Those in the <a href=\"https:\/\/www.networkworld.com\/article\/3560993\/what-is-wi-fi-and-why-is-it-so-important.html\">Wi-Fi<\/a> standard itself, and therefore affecting most devices, and those caused by widespread programming mistakes in individual Wi-Fi-product implementations.<\/p>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html\">[Get regularly scheduled insights by signing up for Network World newsletters.]<\/a><\/aside>\n<p>Among major Wi-Fi vendors, only Aruba\/HPE and Huawei have publicly acknowledged the disclosure of the FragAttack flaws. Aruba issued a statement saying that its access points contained the flaws, but that it updated its software prior to this week\u2019s disclosure of them, and <a href=\"https:\/\/www.arubanetworks.com\/assets\/alert\/ARUBA-PSA-2021-011-FAQ.pdf\" rel=\"nofollow\">provided a document detailing which APs have been patched.<\/a><\/p>\n<p>Huawei stated that it has \u201claunched an immediate investigation,\u201d and pledged to provide public updates when it has more information to share. Cisco and Ubiquiti declined to provide public comment as of Friday afternoon.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>Vanhoef is issuing his report after nine months of disclosure with Wi-Fi vendors to enable them to fix the problems. A tool to check whether equipment is vulnerable to these flaws is <a href=\"https:\/\/github.com\/vanhoefm\/fragattacks\" rel=\"nofollow\">available here for free<\/a>.<\/p>\n<p>The three most wide-ranging and serious flaws can allow attackers to inject malicious frames into a protected Wi-Fi network. This could allow an attacker to trick a client device into using a malicious DNS server or to force traffic through a router, bypassing NAT and firewalls. The weaknesses affect products made by nearly all of the major manufacturers.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>\u201cFortunately, the [Wi-Fi-standard] design flaws are hard to abuse because doing so requires user interaction or is only possible when using uncommon network settings,\u201d according to Vanhoef\u2019s site. \u201cAs a result, in practice the biggest concern are the programming mistakes in Wi-Fi products since several of them are trivial to exploit.\u201d<\/p>\n<p>The most exploits work because of vulnerabilities in the way Wi-Fi handles frame fragmentation and frame aggregation, according to Vanhoef. Frame aggregation is designed to make network connections faster by combining smaller frames into a larger one, using a system of flags that tells devices whether a given frame is a single frame or an aggregated one. The problem is that the \u201caggregated\u201d flag is not authenticated on both ends of the connection and can be spoofed by a bad actor.<\/p>\n<p>Fragmentation does the opposite, splitting larger frames into smaller ones for increased reliability. The flaw is that receiving devices aren\u2019t required to check whether all parts of a split frame have been encrypted using the same keys, meaning that an attacker could steal data from a network by mixing up different fragments.<\/p>\n<p>The other vulnerabilities identified by Vanhoef include aspects of Wi-Fi\u2019s WPA security protocols that don\u2019t do enough by default to authenticate and match up all parts of a message, leaving openings that could be used to compromise networks and steal data.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>Forrester analyst Andre Kindness said the chances of these flaws being exploited in the wild seem remote at best.<\/p>\n<p>\u201cIs it something that would keep me up at night? Heck no,\u201d Kindness said. \u201cIt\u2019s like an Oceans 11 or Mission: Impossible scenario\u2014you\u2019d have to know what someone has. You\u2019d have to encounter the perfect scenario where someone didn\u2019t do something right in the firmware for the device or AP, and you\u2019d have to be in radio distance.\u201d<\/p>\n<p>Kindness said that enterprise users should simply ensure all their patching is up-to-date, use the scanning tool, and proceed from there if they discover flaws.<\/p>\n<p>Vanhoef is scheduled to present a talk on FragAttack at the <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity21\" rel=\"nofollow\">USENIX Security Symposium<\/a>, scheduled as a virtual event Aug. 11\u201313.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3618991\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nAlmost all Wi-Fi is potentially vulnerable to flaws that date back to 1997 when it became commercially available, but even the person who discovered the weaknesses says some of them are difficult to exploit.<br \/>\nWi-Fi resources<\/p>\n<p> Test and review of 4 Wi-Fi 6 routers: Who\u2019s the fastest?<br \/>\n How to determine if Wi-Fi 6 is right for you<br \/>\nFive questions to answer before deploying Wi-Fi 6<br \/>\n Wi-Fi 6E: When it\u2019s coming and what it\u2019s good for<\/p>\n<p>Mathy Vanhoef, a post-doctoral student at NYU Abu Dhabi, has created attacks\u2014FragAttacks\u2014that take advantage of the vulnerabilities, but in an academic paper about them, says the most widespread vulnerabilities can be exploited only under specific, rare conditions, and require either user interaction or highly unusual configurations to succeed.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":40884,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[762,307,96],"class_list":["post-40883","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-networking","tag-security","tag-wi-fi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-14T22:16:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously\",\"datePublished\":\"2021-05-14T22:16:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/\"},\"wordCount\":732,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg\",\"keywords\":[\"Networking\",\"Security\",\"Wi-fi\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/\",\"name\":\"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg\",\"datePublished\":\"2021-05-14T22:16:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/networking\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/","og_locale":"en_US","og_type":"article","og_title":"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-14T22:16:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously","datePublished":"2021-05-14T22:16:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/"},"wordCount":732,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg","keywords":["Networking","Security","Wi-fi"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/","url":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/","name":"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg","datePublished":"2021-05-14T22:16:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fragattack-flaws-threaten-wi-fi-but-not-too-seriously\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Networking","item":"https:\/\/www.threatshub.org\/blog\/tag\/networking\/"},{"@type":"ListItem","position":3,"name":"\u2018FragAttack\u2019 flaws threaten Wi-Fi, but not too seriously"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40883"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40883\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/40884"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}