OpenWiFi
2.4.0
2.4.0
  • OpenWiFi Release 2.4 GA
  • Ordering OpenWiFi APs
  • Device Partner Information
  • Cloud Partner Information
  • Getting Started
    • Cloud Discovery
      • Discovery without Cloud
    • Release 2.0 SDK
    • Access Points
      • Local Device Settings
    • Repositories
  • Provisioning
    • Data Model Introduction
    • Creating a Configuration
  • User Interface
    • Devices
      • Commands
      • Statistics
      • Command History
    • Firmware
  • API
    • OpenAPI Definitions
    • Security Service
    • Gateway Service
    • Firmware Management Service
  • Monitoring
    • ELK Integration
  • SDK Installation
    • Overview
    • Deploy using Docker Compose
    • Deploy using Helm
  • Configuration Examples
    • Basic Device Provisioning
      • Bridge Mode SSID
      • NAT Gateway Mode SSID
      • Multi-VLAN SSID
    • Device Feature Configuration Examples
      • Zero Touch Provisioning
      • DHCP Relay
      • Services
      • Metrics
      • GRE
      • L2TP
      • VxLAN
      • WDS
      • Mesh
      • QoS
      • Dynamic Air Time Fairness
      • Dynamic Subscriber QoS
      • Captive Portal
        • External Captive Portal
      • ExpressWiFi
      • Roaming RRM and SON
      • RADIUS Authenticated SSID
        • Dynamic VLANs with RADIUS
      • Multi-PSK (MDU Shared Key)
      • Dynamic Air-Time Policy
      • Passpoint®
        • Configuration Introduction
        • Advertising Services
        • Passpoint® Configuration
      • Switching
        • Port Speed
  • Release Notes
    • Features
    • Security
    • Resolved Issues
  • Test Automation Framework
    • Overview
Powered by GitBook
On this page
  1. Release Notes

Security

PreviousFeaturesNextResolved Issues

Last updated 3 years ago

The following list of major security enhancements have been implemented within the 2.4 release:

Issue

Description

Resolution

Password reset and email verification procedures can be exploited by an adversary that acquired a user ID

Hardened action link generation with UUIDs

Cloud services do not log sensitive events occurred during runtime

Implemented security logs to collect evidence that can help with incident investigation

Weak password hash computation is vulnerable to rainbow table attacks

Hardened password hash computation with salting

Hardcoded default password is vulnerable to password guessing attacks

Implemented password change procedure on first login and replaced hardcoded password with a hash

Some API responses leak user secrets by revealing password hashes

Removed password hashes from API responses

Some API responses reveal server version which can be leveraged by an adversary to compromise it using exploits

Removed server version from API responses

API ‘system’ command leak internal file tree by revealing absolute paths of certificate files

Replaced absolute paths of certificates with file names

Cloud services are vulnerable to black box exploitation attempts, brute forcing, credential stuffing and DDoS

Implemented IP-based rate limit for API endpoints

Weak UUID generation with reduced entropy

Hardened UUID by increasing entropy

RTTY-enabled APs can be overtaken by an adversary accessing RTTYS dedicated management interface using default hardcoded credentials

Hardened RTTYS access by randomizing default credentials at deployment

Known security issues

  • - RTTYS version used has security flaws which are to be resolved in next releases

WIFI-5770
WIFI-3585
WIFI-6011
WIFI-5615
WIFI-5616
WIFI-5617
WIFI-5618
WIFI-5619
WIFI-5724
WIFI-5727
WIFI-5772