Home > CAPEC List > CAPEC-604: Wi-Fi Jamming (Version 2.11)  

CAPEC-604: Wi-Fi Jamming

Wi-Fi Jamming
Definition in a New Window Definition in a New Window
Attack Pattern ID: 604
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

In this attack scenario, the attacker actively transmits on the Wi-Fi channel to prevent users from transmitting or receiving data from the targeted Wi-Fi network. There are several known techniques to perform this attack – for example: the attacker may flood the Wi-Fi access point (e.g. the retransmission device) with deauthentication frames. Another method is to transmit high levels of noise on the RF band used by the Wi-Fi network.

+ Attack Prerequisites
  • Lack of anti-jam features in 802.11

  • Lack of authentication on deauthentication/disassociation packets on 802.11-based networks

+ Typical Severity


+ Typical Likelihood of Exploit

Likelihood: Medium

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: Low

This attack can be performed by low capability attackers with freely available tools. Commercial tools are also available that can target select networks or all WiFi networks within a range of several miles.

+ Solutions and Mitigations

Countermeasures have been proposed for both disassociation flooding and RF jamming, however these countermeasures are not standardized and would need to be supported on both the retransmission device and the handset in order to be effective. Commercial products are not currently available that support jamming countermeasures for Wi-Fi.

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
A successful attack will deny the availability of the Wi-fi network to authorized users.
DoS: resource consumption (other)
The attacker's goal is to prevent users from accessing the wireless network. Denying connectivity to the wireless network prevents the user from being able to transmit or receive any data, which also prevents VOIP calls, however this attack poses no threat to data confidentiality.
+ Technical Context
Architectural Paradigms
+ Content History
CAPEC Content TeamThe MITRE Corporation2015-11-09Internal_CAPEC_Team
CAPEC Content TeamThe MITRE Corporation2017-08-04Updated Attack_Motivation-Consequences, Related_Vulnerabilities, Typical_Likelihood_of_Exploit, Typical_SeverityInternal

More information is available — Please select a different filter.
Page Last Updated or Reviewed: August 04, 2017