if you update your mikrotik on 7.22 today, do not forget to enable the new RA Guard in the bridge settings.

It help to block some ipv6 router advertising attack.

change log don't say if there is fix to airsnitch or not tough

more info:

https://help.mikrotik.com/docs/spaces/ROS/pages/328068/Bridging+and+Switching#BridgingandSwitching-RAGuard

#mikrotik @mikrotik #update #upgrade #security #ipv6 #airsnitch #wifi #bridge #raguard #slaac

Bridging and Switching - RouterOS - MikroTik Documentation

📢 AirSnitch : une nouvelle attaque contourne le chiffrement Wi‑Fi dans les foyers, bureaux et entreprises
📝 Selon Ars Technica, une nouvelle attaque baptisée...
📖 cyberveille : https://cyberveille.ch/posts/2026-03-05-airsnitch-une-nouvelle-attaque-contourne-le-chiffrement-wi-fi-dans-les-foyers-bureaux-et-entreprises/
🌐 source : https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/
#AirSnitch #Wi_Fi #Cyberveille
AirSnitch : une nouvelle attaque contourne le chiffrement Wi‑Fi dans les foyers, bureaux et entreprises

Selon Ars Technica, une nouvelle attaque baptisée AirSnitch permet de contourner le chiffrement des réseaux Wi‑Fi, avec une portée annoncée couvrant les foyers, les bureaux et les entreprises. Nom de l’attaque : AirSnitch Nature : contournement du chiffrement Wi‑Fi 📶🔓 Portée/Environnements : foyers, bureaux, entreprises AirSnitch : nouvelle attaque permettant de contourner l’isolation Wi-Fi Contexte Des chercheurs ont dévoilé AirSnitch, une nouvelle famille d’attaques capable de contourner les mécanismes d’isolation entre clients Wi-Fi, même lorsque les communications sont chiffrées.

CyberVeille

#infosec #wifi #attack #airsnitch

Исследователи из Калифорнийского университета в Риверсайде разработали новый класс атак на беспроводные сети - AirSnitch.

https://www.ndss-symposium.org/wp-content/uploads/2026-f1282-paper.pdf

Атаки дают возможность обойти механизмы изоляции клиентов в Wi-Fi сети, не позволяющие клиентам напрямую обращаться друг к другу. При наихудшем сценарии атаки позволяют злоумышленнику перенаправить через себя трафик жертвы (MITM) для анализа или модификации незашифрованных запросов, а также подменить обращения к сайтам через отравление DNS-кэша.

Проблемы, позволяющие совершить атаку:
-- Обход изоляции между клиентами из-за некорректного управления ключами, используемыми для защиты широковещательных кадров.
-- Изоляция обычно применяется на уровне MAC или на уровне IP, но не на обоих уровнях одновременно.
-- Ненадёжная синхронизация идентификаторов клиентов на уровне всего сетевого стека -> перехват входящего и исходящего трафика других клиентов.

https://www.opennet.ru/opennews/art.shtml?num=64881

The Wi-Fi Safety Net Has a Hole in It — and It's Been There All Along

Researchers reveal AirSnitch, an attack that bypasses Wi-Fi client isolation on nearly every tested router, including WPA3 enterprise networks. What Australians need to know.

The Daily Perspective

So … #AirSnitch is just hot air?
Actionable thing for anyone: Don't bridge trusted/untrusted networks (if you don't know whether your router properly separates both networks, run).

And going forward, don't assume public (password protected) hotspots are safe for unencrypted connections - which they never were, because the entire internet is not safe for unencrypted connections.

New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises

That guest network you set up for your neighbors may not be as secure as you think.

Ars Technica
@bsi mal so #nebenbeigefragt. Kommt vom #BSI noch was zu #AirSnitch??
WLAN-Sicherheitslücke AirSnitch: Client-Isolation selbst in WPA3-Enterprise ausgehebelt

Die WLAN-Sicherheitslücke AirSnitch umgeht die WLAN-Client-Isolation, selbst WPA3-Enterprise ist betroffen.

TARNKAPPE.INFO

"New research shows that behaviors that occur at the very lowest levels of the network stack make encryption—in any form, not just those that have been broken in the past—incapable of providing client isolation, an encryption-enabled protection promised by all router makers, that is intended to block direct communication between two or more connected clients.

The isolation can effectively be nullified through AirSnitch, the name the researchers gave to a series of attacks that capitalize on the newly discovered weaknesses. Various forms of AirSnitch work across a broad range of routers, including those from Netgear, D-Link, Ubiquiti, Cisco, and those running DD-WRT and OpenWrt.

AirSnitch “breaks worldwide Wi-Fi encryption, and it might have the potential to enable advanced cyberattacks,” Xin’an Zhou, the lead author of the research paper, said in an interview. “Advanced attacks can build on our primitives to [perform] cookie stealing, DNS and cache poisoning. Our research physically wiretaps the wire altogether so these sophisticated attacks will work. It’s really a threat to worldwide network security.” Zhou presented his research on Wednesday at the 2026 Network and Distributed System Security Symposium.

Paper co-author Mathy Vanhoef, said a few hours after this post went live that the attack may be better described as a Wi-Fi encryption “bypass,” “in the sense that we can bypass client isolation. We don’t break Wi-Fi authentication or encryption. Crypto is often bypassed instead of broken. And we bypass it ;)” People who don’t rely on client or network isolation, he added, are safe."

https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/

#CyberSecurity #Wifi #Encryption #AirSnitch

New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises

That guest network you set up for your neighbors may not be as secure as you think.

Ars Technica