A newly disclosed Wi-Fi vulnerability known as Kr00k has left billions of devices exposed to potential data leaks, allowing nearby attackers to intercept sensitive information in transit. Unveiled by security firm ESET at the RSA Conference, the flaw affects a wide array of popular devices from iPhones and Kindles to routers from major manufacturers like Asus and Huawei.
A Closer Look at the Kr00k Flaw
At the core of this vulnerability lies a weakness in Wi-Fi chips manufactured by Cypress Semiconductor and Broadcom, which are widely used across consumer electronics. When a device disconnects (or is forcibly disconnected) from a Wi-Fi network, affected chips may temporarily use an all-zero encryption key to transmit unsent data. This momentary lapse in protection allows a nearby attacker to intercept and decrypt that data with minimal effort.
ESET, which discovered the bug, has labeled it CVE-2019-15126, warning that routers and access points using the flawed chips are especially concerning because even patched devices connecting to an unpatched router remain vulnerable to having their data leaked.
Devices Confirmed to Be Vulnerable
The list of impacted devices is staggering. ESET confirmed the vulnerability in a variety of popular hardware, including:
Smartphones & Tablets: iPhone 6 through XR, iPad mini 2, Nexus 5, 6, 6P, Samsung Galaxy S4 and S8, Xiaomi Redmi 3S
Laptops & Computers: MacBook Air Retina (2018)
Smart Home Devices: Amazon Echo (2nd Gen), Kindle (8th Gen)
Single-board Computers: Raspberry Pi 3
Routers: Asus RT-N12, Huawei EchoLife HG8245H, B612S-25d, E5577Cs-321
While many of these devices have since received firmware patches, the real danger lies in devices that remain unpatched especially routers, which users rarely update or even know how to.
How the Attack Works
The attack relies on a disassociation process when a device disconnects from a Wi-Fi access point due to signal loss, interference, or roaming. Hackers can spoof this process by sending fake management frames, tricking devices into repeatedly disconnecting.
When that happens, any data lingering in the device’s buffer is sent out encrypted using a flawed all-zero key. In practice, an attacker simply needs to be within range of the vulnerable device and can force multiple disconnections to capture useful data, a few kilobytes at a time.
While attackers would need significant luck to capture sensitive details like passwords, the risk is amplified when unencrypted communication channels are used such as standard DNS lookups or outdated websites not using HTTPS.
Are You at Risk?
The good news is that many manufacturers have already issued patches, including Apple, which confirmed fixing the issue for macOS, iOS, and iPadOS back in October. However, the bad news is that millions of devices remain unpatched, particularly in the case of Wi-Fi routers, which tend to be neglected when it comes to updates.
Even worse, a vulnerable router can compromise the security of patched client devices meaning the chain is only as strong as its weakest link.
Why It Still Matters Today
Despite the flaw being publicly disclosed in 2020, the lingering threat remains relevant. Many devices using these chips are still in operation, and consumers often remain unaware that their Wi-Fi routers can be a weak point.
Though the vulnerability doesn’t allow for mass-scale attacks or remote exploitation, it serves as a critical reminder that even brief moments of encryption failure can expose sensitive data especially when combined with social engineering or poorly secured apps.
What You Should Do
Here’s how you can protect yourself:
Update Your Devices: Ensure all your phones, tablets, laptops, and smart home devices are running the latest firmware or operating system updates.
Check Your Router Firmware: Visit your router manufacturer’s website and manually check for firmware updates.
Use Encrypted Connections: Prefer HTTPS websites and enable DNS over HTTPS (DoH) or DNS over TLS (DoT) in your browser or OS settings.
Replace Old Hardware: If your router or device no longer receives updates, it may be time to upgrade.
Final Thoughts
Kr00k is a sobering example of how deeply embedded vulnerabilities can lie in the tech we rely on every day. While its real-world threat may seem limited, it underscores the importance of routine updates, encrypted communication, and vigilance in maintaining cybersecurity hygiene.
In an age where our devices talk to each other constantly often without us realizing—a single weak link could be the open door hackers are waiting for.