New Attack Against Wi-Fi

It’s called AirSnitch:

Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client across these and higher layers, other nodes, and other network names such as SSIDs (Service Set Identifiers). This cross-layer identity desynchronization is the key driver of AirSnitch attacks.

The most powerful such attack is a full, bidirectional machine-in-the-middle (MitM) attack, meaning the attacker can view and modify data before it makes its way to the intended recipient. The attacker can be on the same SSID, a separate one, or even a separate network segment tied to the same AP. It works against small Wi-Fi networks in both homes and offices and large networks in enterprises.

With the ability to intercept all link-layer traffic (that is, the traffic as it passes between Layers 1 and 2), an attacker can perform other attacks on higher layers. The most dire consequence occurs when an Internet connection isn’t encrypted­—something that Google recently estimated occurred when as much as 6 percent and 20 percent of pages loaded on Windows and Linux, respectively. In these cases, the attacker can view and modify all traffic in the clear and steal authentication cookies, passwords, payment card details, and any other sensitive data. Since many company intranets are sent in plaintext, traffic from them can also be intercepted.

Even when HTTPS is in place, an attacker can still intercept domain look-up traffic and use DNS cache poisoning to corrupt tables stored by the target’s operating system. The AirSnitch MitM also puts the attacker in the position to wage attacks against vulnerabilities that may not be patched. Attackers can also see the external IP addresses hosting webpages being visited and often correlate them with the precise URL.

Here’s the paper.

Posted on March 9, 2026 at 6:57 AM9 Comments

Comments

AlexT March 9, 2026 9:36 AM

Interisting one.

Just skimmed the paper but does it necessitate specialzed hardware?

Clive Robinson March 9, 2026 9:57 AM

@ AlexT,

Like you, I’ve only had a brief look through the paper.

That said, the conclusion is quite short and the latter part of,

We
believe that a root cause of these vulnerabilities is the missing
standardization of client isolation: this defense was added
by vendors without proper public review. However, we have
shown that client isolation is surprisingly tedious to get right
in modern Wi-Fi networks due to their complexity. Moreover,
we have shown that client isolation in home networks, which
is often a configuration option in routers, is fundamentally
flawed. We hope our work motivates standardization groups
to more rigorously specify the requirements of client isolation
and that Wi-Fi vendors will implement the same more securely.

Is quite revealing in what it says, in that it basically portraits all parts of the design process as not what they could or should have been for a robust and secure system…

Bernie March 9, 2026 10:04 AM

A quick note: Just below the article on Ars are a few highlighted comments that help explain things. If you read the article, make sure you scroll down past its end for those comments.

Peter A. March 9, 2026 11:30 AM

Do I understand correctly that this attack applies only after a rogue device is already authenticated and allowed on the network (SSID), such as an a known-password “guest” or “public” WiFi, or when it has been provided, guessed or cracked the password, and only after that the attacker is able to MiTM traffic to/from other devices on the same SSID?

Rontea March 9, 2026 1:14 PM

AirSnitch is another reminder that the foundations of our wireless networking stack are far weaker than we’d like to believe. Attacks like this don’t rely on breaking WPA3 encryption directly—they exploit the trust assumptions baked into the hardware and firmware that implement Wi-Fi. Client isolation, a feature that was supposed to keep devices safely siloed, is now demonstrably unreliable.

Defense against AirSnitch isn’t about a single patch. It’s about layered mitigations:

  1. Update your infrastructure – Apply firmware updates from your router vendors immediately, even if they only partially address the issue.
  2. Segment and monitor your network – Treat Wi-Fi as an untrusted medium. Use VLANs, network segmentation, and active monitoring to detect unusual traffic between clients.
  3. Use end-to-end encryption – TLS, VPNs, and encrypted protocols remain your best defense against traffic interception.
  4. Consider zero-trust principles – Don’t rely on client isolation or SSID separation alone. Assume the network can be compromised and authenticate at higher layers.

Ultimately, AirSnitch reinforces a point we’ve seen before: security bolted onto inherently insecure protocols will always be fragile. Long-term solutions require redesigning the underlying systems, not just patching the symptoms.

Clive Robinson March 9, 2026 4:20 PM

@ ALL,

For those trying to read either the ARS article or the paper you first need to understand the notion of

1, A class of attacks.
2, Instances of attacks in a class.

The paper is about both… And thus so is the article. That is it’s about several different instances of attacks in a general class, all interoperating.

Thus the key bit in the ARS article is,

The isolation can effectively be nullified through AirSnitch, the name the researchers gave to a series of attacks that capitalize on the newly discovered weaknesses.

Note the plurals “attacks” and “weaknesses”

You also need to understand what happens with network,

1, Bridges
2, Switches
3, Routers

And what layers they do or do not operate at.

Worse that networks can be layered on top of each other. That is in normal use people get taught about a physical layer and assume it is the “base layer” often not realising or considering that it could be another high level network like X25 or another routed IP network. Or it could be another “implicit network” like having three different frequency 2.5GHz / 5.0GHz / 6.0GHz interfaces in the same “Access Point”(AP) that get the equivalent of “bridged or switched” into a single equivalent wired interface inside the lowest layers of the AP.

Hence the preceding paragraph,

“New research shows that behaviors that occur at the very lowest levels of the network stack make encryption—in any form, not just those that have been broken in the past—incapable of providing client isolation, an encryption-enabled protection promised by all router makers, that is intended to block direct communication between two or more connected clients.”

That is at the lowest physical layer you can have a legitimate user and an attacker. The first on say the 2.5GHz OTA interface with the second being on the 5GHz OTA interface.

If the attacker makes their MAC address the same as the legitimate user, then the AP will send traffic from higher layers in the stack to both the 2.5 and 5.0 interfaces, as well as also combining what is sent from both to higher layers in the network stack to appear as a single instance. Thus the higher layers see a single “device” not two… And Silo / isolation is broken in effect “covertly” to the higher layers in the ISO OSI seven layer stack.

Now consider the same going on at each of the three lower layers of the OSI network stack, as well as the extra hidden layers covered by layer 1 (Physical)…

Once you get that idea into your thinking process you need to understand why things have been done this way…

Put simply “lack of resources” there are only so many valid frequency channels and they each only have a limited bandwidth… Thus “channel bonding” or “interface bonding” are very real things to get increased bandwidth or reduced latency.

Oh and don’t forget users want or need to be in effect “mobile” and skip from channel to channel and AP to AP even though they may not be physically moving about, others around them are. So channels may become unusable due to multipath, jamming, or countless other reasons. The user need to be “frequency agile” or they get very upset…

To effectively “silo / isolate users” it needs to be done at the lowest layer and for basic technical reasons it’s not done that way because of “abstraction” due to issues of “resources” and “ambiguity”… Because you will in ordinary operation have a single user appearing on multiple interfaces simultaneously as they move, it can not be avoided…

This brings up the issue of where “crypto keys” or “KeyMat” used for the silo / issolation process actually are, and how they get used simultaneously and moved from interface to interface and remain working in what is an asynchronous model by necessity.

So don’t expect these issues to be solved any time soon.

Which means you have to “mitigate” either partially or fully at the higher layers of the ISO OSI model. By adopting a “no plaintext on the wire” model of operation (which is verboten in many organisations due to regulatory compliance for the likes of “insider trading” etc).

However other “Man in the Middle” attacks work even at these layers at the “key negotiation” time…

Which brings us back to,

1, Security
2, Efficiency
3, Workability / Interoperability

“Pick any two of three”, but remember

“Security -v- Efficiency”

Is always a trade off as I’ve been saying here and other places for many many years now. I’ve also been pointing out that network security in a “broadcast model” is hard, and both ends being mobile makes it not just very very hard but under some security models “impossible”.

If you want to dance to the tune of “user convenience” then you “have to pay the piper” his very very costly due.

Clive Robinson March 9, 2026 5:47 PM

@ ALL,

Something that becomes apparent from reading the ARS comments is how few people actually understand the ISO OSI Seven Layer Model.

It’s not about “what’s in the layer boxes” it’s actually about two things,

1, The general “agreed” function inside the box.
2, The interface protocols between the layers/boxes.

That is it is about “contracts”…

But it’s also important to note that both Layer 1 and Layer 7 are “open ended”.

This means you can plug any depth of physical layers in at the bottom and any hight of layers above at the top as long as the interface is correct.

Which is why you can have “ethernet” routed around the world on another IP network or as in the past on an X25 network. Even IBM and Cambridge Ring networks.

So it does not as some appear to think mean physical like a TX/RX chip in a WiFi card the radio waves it emits or how it switches channels with mobile client devices or satellites in space using lasers.

It’s all about,

1, The expected function available
2, By the specified interface.

Hence it’s the specified “contract” not the abstracted “method” the contract is met with.

As an analogy you need ten tonnes of “pea-shingle” for some construction work.

Do you care about the delivery method?

That is the vehicle(s) it comes on or if it’s delivered in half hundred weight bags, one ton slings, or just a loose heap at a designated drop point?

If “no” then “it does not go in the contract” if “yes” say due to having a weight restricted bridge or machine that only takes a certain type of input then “it does go in the contract”.

Get the contract right, and matched then things should work out correctly.

cls March 11, 2026 12:13 AM

Since many company intranets are sent in plaintext, traffic from them can also be intercepted.

It’s actually hard work to generate, deploy, and maintain certificates for TLS, and there’s no relaxing the rules for home made internal-only certs.

Defense in depth suggests that protecting all internal traffic would be a good investment, but the trade off of some part of the business being disconnected most of the time is too costly.

And many legacy business applications don’t run over TLS.

So most orgs rely on layer 1, vlans, and other layer 2 isolations.

cls March 11, 2026 12:25 AM

@Clive

Something that becomes apparent from reading the ARS comments is how few people actually understand …

True for every comment section on every story on Ars.

Along with the myopic and literalist reading skills of the mostly on-spectrum folks there, the huge normative impulse and culture of intolerance, and unthreaded replies, means collaborative and informative discourse is difficult to impossible there.

The best that happens is when an expert posts something that augments the article.

… the ISO OSI Seven Layer Model.

Oh that, yeah. So why didn’t you post something on Ars to help them?

Seriously.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.