Summary:
The authors discuss a security flaw in Wi-Fi routers’ NAT mapping handling that allows attackers to bypass TCP’s randomization leading to off-path TCP hijacking attacks. They provide attack steps, empirical study results on vulnerable routers, and mitigation strategies such as random port allocation and TCP window checking. They have informed affected manufacturers, with some already releasing patches, and others working on fixes. The authors recommend countermeasures to strengthen router security. The findings have been accepted for NDSS 2024, shedding light on the importance of network security in the age of widespread Wi-Fi use.
https://blog.apnic.net/2024/06/18/off-path-tcp-hijacking-in-nat-enabled-wi-fi-networks/