
The researchers have published an open source tool called MacStealer to test Wi-Fi networks for the vulnerability.Ĭisco downplayed the report, saying “information gained by the attacker would be of minimal value in a securely configured network."

The vulnerability exploits on-device power-save behavior within the Wi-Fi standard to force data to be shared in unencrypted form.

To achieve the attack, miscreants must forcibly disconnect the victim device before it properly connects to the network, spoof the MAC address of the device to connect to the network using the attacker’s credentials, then grab the response.
