tinyGS icon indicating copy to clipboard operation
tinyGS copied to clipboard

Security Issue: Fallback to unprotected, public Wifi AP if connection fails

Open h0lad opened this issue 3 years ago • 1 comments

Firmware: v2105260 Device: TTGO Lora 32

Hi!

I just spotted that my TinyGS started playing Wifi-Accesspoint due to local network maintenance.

It failed to connect to the pre-configured accesspoint so activated its fallback routines. The SSID was not protected by any Password so everybody was able to connect. This is a serve security problem as it for sure can be forced using targeted deauth attacks.

This might be OK during the configuration of the device for an extremely short time span.. but never should happen to a fully configured node.

I was able to

  • Update the firmware
  • Extract MQTT passwords
  • Extract the WGS84 coordinates
  • Extracting the accesspoint name (and maybe able to extract the passwords using a specially crafted firmware)

How to reproduce:

  1. Fully setup TinyGS node
  2. Disable the AP the device is connecting to
  3. Wait for the device creating an AP that is having the same name as your TinyGS node
  4. Connect and open 192.168.4.1 using your browser

Best Regards, Holger

h0lad avatar Jun 17 '22 08:06 h0lad

On mine, the fallback access point seems to use the same password as I've selected for the admin page

tkerby avatar Jul 02 '22 18:07 tkerby