MFP Deauthentication — Tearing Down Protected-Management-Frame Sessions

MFP / 802.11w was supposed to make deauth attacks impossible. It almost does — but the standard has under-specified edges that let an attacker still tear down sessions.

Status: drafting Venue: WiSec 2022; FPS 2022 (“Cut It”) Authors: Domien Schepers (Northeastern), Mathy Vanhoef (KU Leuven imec-DistriNet) Related: Management Frame Protection (MFP), Handshakes, Wi-Fi Key Hierarchy, Rogue AP


What it is

802.11w (a.k.a. PMF / MFP — Protected Management Frames) authenticates a subset of management frames — most importantly Deauthentication and Disassociation. With MFP enabled, a third party should not be able to forge a deauth and bump a victim off the network.

The Schepers / Vanhoef line of work shows that MFP doesn’t fully close the deauth gap:

  • Unprotected SA-Query timeout. When the AP can’t decide whether a station is still associated (e.g., race during a roam), it sends an SA-Query. If the response doesn’t arrive in time, the AP disassociates the client. An attacker who blocks SA-Query responses can force this disassociation without forging any frame.
  • Unauthenticated frame types. Some frame types (Beacon, Probe Request/Response, parts of WNM) are not protected even with MFP. Manipulating these can drive the client into a state where the legitimate AP will eventually deauthenticate it cleanly — the attacker doesn’t forge the deauth, the AP sends it for them.
  • Implementation bugs. Multiple stacks (Linux, Apple, Windows, Android) accept deauth frames that should be filtered, accept them with mismatched RSNs, or follow contradictory rules between different parts of the standard.
  • Cut It (FPS 2022) demonstrates concrete deauth attacks against PMF-enabled WPA2-PSK and WPA3-PSK networks despite “the protection”.

Why it matters

Deauth attacks are the entry point to many further attacks:

  • They drop a victim off the network so the attacker can rogue-AP them with a clone.
  • They force a fresh 4-way handshake the attacker can capture for offline cracking.
  • They reset queue / power-save state in ways Framing Frames can exploit.

Closing the deauth gap is therefore a precondition for trusting any of the higher-layer Wi-Fi guarantees.


What stops it

  • Updated implementations — the WiSec 2022 paper drove patches in mac80211, hostap, IWD, Apple, Microsoft, and Android.
  • Spec clarifications — IEEE 802.11 working group amendments tighten the rules around SA-Query timeouts and frame-type protection.
  • Beacon protection (BIGTK, IGTK extensions) raises the cost of unprotected-frame manipulation.
  • Wired-side hygiene — combining MFP with VLANs / firewalling limits what an attacker can do after a deauth even if they succeed.

Tooling


References