Chapter 6: Security & Risks

Wireless threat landscape, risk assessment, attack vectors, and mitigation controls for enterprise Wi-Fi deployments


Wireless networks present a fundamentally different threat surface compared to wired networks: the transmission medium is shared and physically accessible to anyone within RF range, including adversaries outside the building perimeter. Understanding the wireless threat landscape and implementing appropriate countermeasures is essential to maintaining the security posture of the overall enterprise network. This chapter catalogs the primary wireless attack vectors, assesses their risk level, and maps each threat to specific technical controls.

6.1 Wireless Threat Landscape

CRITICAL — Evil Twin / Rogue AP Attack

Description: An adversary deploys a rogue access point with the same SSID and BSSID as a legitimate enterprise AP, often with higher signal strength, to lure clients into connecting to the attacker-controlled network. Once connected, all client traffic passes through the attacker, enabling credential theft, session hijacking, and malware injection.

Mitigation: WPA3-Enterprise with mutual authentication (EAP-TLS) prevents clients from connecting to APs that cannot present a valid server certificate. WIPS continuously monitors for SSIDs matching the enterprise namespace with unauthorized BSSIDs. PMF (802.11w) prevents deauthentication flood attacks used to force clients to reconnect to the evil twin.

CVSS: 9.1 CriticalLikelihood: HighImpact: Data BreachControl: WPA3+EAP-TLS+WIPS+PMF
CRITICAL — KRACK / Protocol-Level Attack

Description: Key Reinstallation Attacks (KRACK) exploit vulnerabilities in the WPA2 four-way handshake to force nonce reuse, enabling decryption of encrypted wireless traffic. Similar protocol-level attacks target PMKID, TKIP, and other legacy cryptographic mechanisms.

Mitigation: Mandate WPA3-Enterprise with SAE (Simultaneous Authentication of Equals) which provides forward secrecy and is immune to KRACK-class attacks. Disable all WPA2/WPA1/WEP SSIDs. Enforce firmware updates on all APs to patch known protocol vulnerabilities. Monitor for anomalous handshake patterns in WIPS.

CVSS: 8.8 HighLikelihood: MediumImpact: Traffic DecryptionControl: WPA3-SAE, Firmware Patching
HIGH — Deauthentication / Denial-of-Service Flood

Description: An attacker sends spoofed 802.11 deauthentication or disassociation frames to force clients to disconnect from legitimate APs. This can be used as a standalone DoS attack or as a precursor to an evil twin attack. Without PMF, management frames are unauthenticated and trivially spoofable.

Mitigation: Enable PMF (802.11w) in mandatory mode on all enterprise SSIDs. PMF cryptographically protects management frames, making deauth flood attacks ineffective. WIPS detects abnormal deauthentication frame rates and triggers alerts. Rate limiting on management frames at the AP level provides an additional layer of protection.

CVSS: 7.5 HighLikelihood: HighImpact: Service DisruptionControl: PMF Mandatory, WIPS Detection
HIGH — Unauthorized Device / BYOD Threat

Description: Unmanaged personal devices connecting to the corporate SSID may introduce malware, bypass DLP controls, exfiltrate data, or serve as pivot points for lateral movement. Without NAC enforcement, any device with valid credentials can access corporate resources regardless of its security posture.

Mitigation: Implement NAC with device posture assessment before granting network access. MDM enrollment verification ensures only managed devices access the Corp VLAN. BYOD devices are redirected to a restricted BYOD VLAN with limited access. Certificate-based authentication (EAP-TLS) with MDM-issued certificates prevents non-enrolled devices from authenticating.

CVSS: 7.2 HighLikelihood: HighImpact: Data ExfiltrationControl: NAC, MDM, EAP-TLS Cert
MEDIUM — Credential Theft via PEAP/EAP-TTLS

Description: When EAP-TTLS or PEAP is used with password-based inner authentication, an adversary operating an evil twin AP can capture the outer TLS handshake and attempt offline dictionary attacks against the captured credentials if the client does not validate the server certificate.

Mitigation: Enforce strict server certificate validation on all 802.1X supplicants — clients must verify the RADIUS server certificate against the enterprise CA. Migrate to EAP-TLS (certificate-based) to eliminate password-based attack surface. Use MDM to push correct supplicant configuration to all managed devices, preventing users from accepting invalid server certificates.

CVSS: 6.5 MediumLikelihood: MediumImpact: Credential CompromiseControl: Server Cert Validation, EAP-TLS Migration
MEDIUM — IoT Device Compromise and Lateral Movement

Description: IoT devices typically have limited security capabilities, infrequent firmware updates, and default credentials. A compromised IoT device on the same network segment as corporate systems can be used as a pivot point for lateral movement, reconnaissance, and further compromise.

Mitigation: Isolate all IoT devices in a dedicated VLAN with strict ACLs permitting only necessary communication with specific servers. Implement micro-segmentation to prevent IoT-to-IoT lateral movement. Use PPSK or DPPSK with per-device keys to limit the blast radius of a single device compromise. Monitor IoT device behavior with anomaly detection — flag unusual traffic patterns or new connection destinations.

CVSS: 6.3 MediumLikelihood: MediumImpact: Lateral MovementControl: IoT VLAN, ACL, PPSK, Anomaly Detection

6.2 Wireless Security Risk Assessment Matrix

The following risk matrix maps all identified wireless threats against their likelihood and impact, enabling prioritization of security controls and resource allocation.

ThreatLikelihoodImpactRisk LevelPrimary ControlSecondary Control
Evil Twin / Rogue APHighCriticalCriticalWPA3-Enterprise + EAP-TLSWIPS + PMF
KRACK / Protocol AttackMediumHighCriticalWPA3-SAEFirmware Patching
Deauth DoS FloodHighMediumHighPMF MandatoryWIPS Detection
Unauthorized BYODHighHighHighNAC + MDMEAP-TLS Cert Auth
PEAP Credential TheftMediumMediumMediumServer Cert ValidationEAP-TLS Migration
IoT Lateral MovementMediumHighHighIoT VLAN + ACLAnomaly Detection
RF EavesdroppingLowHighMediumWPA3 EncryptionOWE for Open SSIDs
AP Physical TamperingLowHighMediumTamper-Proof EnclosurePhysical Security Audit
Management Plane AttackLowCriticalHighOOB Management + MFARBAC + Audit Logging

6.3 Security Controls Summary

Control LayerControlStandard/ProtocolThreats Mitigated
Air InterfaceWPA3-Enterprise mandatoryIEEE 802.11i / WPA3KRACK, eavesdropping, credential theft
Air InterfacePMF (Protected Management Frames)IEEE 802.11wDeauth flood, disassoc flood
AuthenticationEAP-TLS with mutual cert validationRFC 5216Evil twin, PEAP attack, unauthorized access
AuthorizationDynamic VLAN + NAC posture checkRFC 3580, 802.1XBYOD threat, IoT lateral movement
MonitoringWIPS continuous RF monitoringIEEE 802.11 / VendorRogue AP, evil twin, deauth flood
MonitoringSIEM event correlationSyslog / CEFAll threats (detection and response)
PhysicalTamper-resistant AP enclosuresPhysical securityAP tampering, hardware implant
ManagementOOB management + MFA + RBACSSH, RADIUS, TACACS+Management plane attack