Submit #488582: Bharti Airtel Airtel Xstream Fiber WiFi N/A Brute force attackinfo

TitleBharti Airtel Airtel Xstream Fiber WiFi N/A Brute force attack
DescriptionIt was observed that Airtel Xstream Fiber WiFi used to set the initial WiFi password for users and users were notified through an SMS on registered phone number, which are predictable and users don't get any notification to update the same. The WiFi password has a pattern of "air<5 random digits>" and potential vulnerable routers have pattern as "Airtel_<first 4 characters of subscriber's name>_<last 4 digits of subscriber's registered phone number>" and "Airtel_<10 digit subscriber's registered phone number>". Using the defined format an attacker can identify potential vulnerable SSID then crack the password offline after capturing the WiFi handshake. Successful attack can result to compromised WiFi network leading to other attacks such as MiTM. If attacker identifies the potential vulnerable SSID (using the pattern mentioned in description) then an attacker only needs to capture the WiFi handshake of identified WiFi APN. And hence pattern for initial password is also known(as mentioned in description), an attacker can brute force the password offline leading to compromised WiFi network. All users using the WiFi connection with initial configuration (Most people rarely change config of personal WiFi) can be a target of this attack. Attacker doesn't need to know subscriber's name or phone number. WiFi SSIDs can be identified by pattern as below: 1. Airtel_<4 alphabets>_<4 digits> 2. Airtel_<10 digits>
Source⚠️ https://packetstorm.news/files/id/188799/
User
 alokkumar0200 (UID 9619)
Submission01/24/2025 11:28 AM (4 months ago)
Moderation02/06/2025 03:18 PM (13 days later)
StatusAccepted
VulDB Entry294857 [Bharti Airtel Xstream Fiber up to 20250123 WiFi Password weak credentials]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!