{"id":55597,"date":"2026-04-10T13:18:25","date_gmt":"2026-04-10T17:18:25","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=55597"},"modified":"2026-04-10T13:18:25","modified_gmt":"2026-04-10T17:18:25","slug":"airsnitch-wi-fi-client-isolation-guest-network-vulnerability-and-mitigation","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/airsnitch-wi-fi-client-isolation-guest-network-vulnerability-and-mitigation\/55597\/","title":{"rendered":"AirSnitch: attacking Wi-Fi client isolation and guest networks"},"content":{"rendered":"<p>At the NDSS Symposium 2026 in San Diego in February, a group of respected researchers presented a study unveiling the <a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/airsnitch-demystifying-and-breaking-client-isolation-in-wi-fi-networks\/\" target=\"_blank\" rel=\"noopener nofollow\">AirSnitch<\/a> attack, which bypasses the Wi-Fi client isolation feature \u2014 also commonly known as guest network or device isolation. This attack allows connecting to a single wireless network via an access point, and then gaining access to other connected devices, including those using entirely different <a href=\"https:\/\/en.wikipedia.org\/wiki\/Service_set_(802.11_network)\" target=\"_blank\" rel=\"noopener nofollow\">service set identifiers<\/a> (SSIDs) on that same hardware. Targeted devices could easily be running on wireless subnets protected by WPA2 or WPA3 protocols. The attack doesn\u2019t actually break encryption; instead, it exploits the way access points handle group keys and packet routing.<\/p>\n<p>In practical terms, this means that a guest network provides very little in the way of real security. If your guest and employee networks are running on the same physical device, AirSnitch allows a connected attacker to inject malicious traffic into neighboring SSIDs. In some cases, they can even pull off a full-blown <a href=\"https:\/\/www.kaspersky.com\/blog\/man-on-the-side\/47125\/\" target=\"_blank\" rel=\"noopener nofollow\">man-in-the-middle<\/a> (MitM) attack.<\/p>\n<h2>Wi-Fi security and the role of isolation<\/h2>\n<p>Wi-Fi security is constantly evolving; every time a practical attack is made against the latest generation of protection, the industry shifts toward more complex algorithms and procedures. This cycle started with the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fluhrer,_Mantin_and_Shamir_attack\" target=\"_blank\" rel=\"noopener nofollow\">FMS attacks<\/a> used to crack WEP encryption keys, and continues to this day: recent examples include the <a href=\"https:\/\/www.krackattacks.com\/\" target=\"_blank\" rel=\"noopener nofollow\">KRACK<\/a> attacks on WPA2, and the <a href=\"https:\/\/www.fragattacks.com\/\" target=\"_blank\" rel=\"noopener nofollow\">FragAttacks<\/a>, which impacted every security protocol version from WEP all the way through WPA3.<\/p>\n<p>Attacking modern Wi-Fi networks effectively (and quietly) is no small feat. Most professionals agree that using WPA2\/WPA3 with complex keys and separating networks based on their purpose is usually enough for protection. However, only specialists really know that client isolation was never actually standardized within the IEEE 802.11 protocols. Different manufacturers implement isolation in completely different ways \u2014 using Layer 2 or Layer 3 of network <a href=\"https:\/\/en.wikipedia.org\/wiki\/OSI_model\" target=\"_blank\" rel=\"noopener nofollow\">architecture<\/a>; in other words, handling it at either the router or the Wi-Fi controller level \u2014 meaning the behavior of isolated subnets varies wildly depending on your specific access point or router model.<\/p>\n<p>While marketing claims that client isolation is perfect for keeping restaurant or hotel guests from attacking one another \u2014 or ensuring corporate visitors can\u2019t access anything but the internet \u2014 in reality, isolation often relies on people not trying to hack it. This is exactly what the AirSnitch research highlights.<\/p>\n<h2>Types of AirSnitch attacks<\/h2>\n<p>The name AirSnitch doesn\u2019t just refer to a single vulnerability, but a whole family of architectural flaws found in Wi-Fi access points. It\u2019s also the name of an open-source tool used to test routers for these specific weaknesses. However, security professionals need to keep in mind that there\u2019s only a very thin line between testing and attacking.<\/p>\n<p>The model for all these attacks is the same: a malicious client is connected to an access point (AP) where isolation is active. Other users \u2014 the targets \u2014 are connected to the same SSID or even different SSIDs on that same AP. This is a very realistic scenario; for example, a guest network might be open and unencrypted, or an attacker could simply get the guest Wi-Fi password by posing as a legitimate visitor.<\/p>\n<p>For certain AirSnitch attacks, the attacker needs to know the victim\u2019s MAC or IP address beforehand.\u00a0 Ultimately, how effective each attack is depends on the specific hardware manufacturer (more on that below).<\/p>\n<h3>GTK attack<\/h3>\n<p>After the WPA2\/WPA3 handshake, the access point and the clients agree on a Group Transient Key (GTK) to handle broadcast traffic. In this scenario, the attacker wraps packets destined for a specific victim inside a broadcast traffic envelope. They then send these directly to the victim while spoofing the access point\u2019s MAC address. This attack only allows for traffic injection, meaning the attacker won\u2019t receive a response. However, even that is enough to deliver malicious ICMPv6 routing advertisements, or DNS and ARP messages to the client \u2014 effectively bypassing isolation. This is the most universal version of the attack working on any WPA2\/WPA3 network that uses a shared GTK. That said, some enterprise-grade access points support GTK randomization for each individual client, which renders this specific method ineffective.<\/p>\n<h3>Broadcast packet redirection<\/h3>\n<p>This version of the attack doesn\u2019t even require the attacker to authenticate at the access point first. The attacker sends packets to the AP with a broadcast destination address (FF:FF:FF:FF:FF:FF) and the ToDS flag set to 1.\u00a0 As a result, many access points treat this packet as legitimate broadcast traffic; they encrypt it using the GTK, and blast it out to every client on the subnet, including the victim. Just like in the previous method, traffic specifically meant for a single victim can be pre-packaged inside.<\/p>\n<h3>Router redirection<\/h3>\n<p>This attack exploits an architectural gap between Layer 2 and Layer 3 security found in some manufacturers\u2019 hardware. The attacker sends a packet to the access point, setting the victim\u2019s IP address as the destination at the network layer (L3).\u00a0 However, at the wireless layer (L2), the destination is set to the access point\u2019s own MAC address, so the isolation filter doesn\u2019t trip. The routing subsystem (L3) then dutifully routes the packet back out to the victim, bypassing the L2 isolation entirely. Like the previous methods, this is another transmit-only attack where the attacker can\u2019t see the reply.<\/p>\n<h3>Port stealing to intercept packets<\/h3>\n<p>The attacker connects to the network using a spoofed version of the victim\u2019s MAC address, and floods the network with ARP responses claiming, \u201cthis MAC address is on my port and SSID\u201d.\u00a0 The target network\u2019s router updates its MAC tables, and starts sending the victim\u2019s traffic to this new port instead. Consequently, traffic intended for the victim ends up with the attacker \u2014 even if the victim is connected to a completely different SSID.<\/p>\n<p>In a scenario where the attacker connects via an open, unencrypted network, this means traffic meant for a client on a WPA2\/WPA3-secured network is actually broadcast over the open air, where not only the attacker but anyone nearby can sniff it.<\/p>\n<h3>Port stealing to send packets<\/h3>\n<p>In this version, the attacker connects directly to the victim\u2019s Wi-Fi adapter, and bombards it with ARP requests spoofing the access point\u2019s MAC address. As a result, the victim\u2019s computer starts sending its outgoing traffic to the attacker instead of the network. By running both stealing attacks simultaneously, an attacker can, in several scenarios, execute a full MitM attack.<\/p>\n<h2>Practical consequences of AirSnitch attacks<\/h2>\n<p>By combining several of the techniques described above, a hacker can pull off some pretty serious moves:<\/p>\n<ul>\n<li>Complete bidirectional traffic interception for a MitM attack. This means they can snatch and modify data moving between the victim and the access point without the victim ever knowing.<\/li>\n<li>Hopping between SSIDs. An attacker sitting on a guest network can reach hosts on a locked-down corporate network if both are running off the same physical access point.<\/li>\n<li>Attacks on <a href=\"https:\/\/en.wikipedia.org\/wiki\/RADIUS\" target=\"_blank\" rel=\"noopener nofollow\">RADIUS<\/a>. Since many companies use RADIUS authentication for their corporate Wi-Fi, an attacker can spoof the access point\u2019s MAC address to intercept initial RADIUS authentication packets. From there, they can brute-force the shared secret. Once they have that, they can spin up a rogue RADIUS server and access point to hijack data from any device that connects to it.<\/li>\n<li>Exposing unencrypted data from \u201csecure\u201d subnets: Traffic that\u2019s supposed to be sent to a client under the protection of WPA2\/WPA3 can be retransmitted onto an open guest network, where it\u2019s essentially broadcast for anyone to hear.<\/li>\n<\/ul>\n<p>To pull off these attacks effectively, a hacker needs a device capable of simultaneous data transmission and reception with both the victim\u2019s adapter and the access point. In a real-world scenario, this usually means a laptop with two Wi-Fi adapters running specifically configured Linux drivers. It\u2019s worth noting that the attack isn\u2019t exactly silent: it requires a flood of ARP packets, it can cause brief Wi-Fi glitches when it starts, and network speeds might tank to around 10Mbps. Despite these red flags, it\u2019s still very much a practical threat in many environments.<\/p>\n<h2>Vulnerable devices<\/h2>\n<p>As part of the study, several enterprise and home access points and routers were put to the test. The list included products from Cisco, Netgear, Ubiquiti, Tenda, D-Link, TP-Link, LANCOM, and ASUS, as well as routers running popular community firmware like DD-WRT and OpenWrt. Every single device tested was vulnerable to at least some of the attacks described here. Even more concerning, the D-Link DIR-3040 and LANCOM LX-6500 were susceptible to every single variation of AirSnitch.<\/p>\n<p>Interestingly, some routers were equipped with protective mechanisms that blocked the attacks, even though the underlying architectural flaws were still present. For example, the Tenda RX2 Pro automatically disconnects any client whose MAC address appears on two BSSIDs simultaneously, which effectively shuts down port stealing.<\/p>\n<p>The researchers emphasize that any network administrator or IT security team serious about defense should <a href=\"https:\/\/github.com\/vanhoefm\/airsnitch\" target=\"_blank\" rel=\"noopener nofollow\">test their own specific configurations<\/a>. That\u2019s the only way to pinpoint exactly which threats are relevant to your organization\u2019s setup.<\/p>\n<h2>How to protect your corporate network from AirSnitch<\/h2>\n<p>The threat is most immediate for organizations running guest and corporate Wi-Fi networks on the same access points without additional VLAN segmentation. There are also significant risks for companies using RADIUS with outdated settings or weak shared secrets for wireless authentication.<\/p>\n<p>The bottom line is that we need to stop viewing client isolation on an access point as a real security measure, and start seeing it as just a convenience feature. Real security needs to be handled differently:<\/p>\n<ul>\n<li>Segment the network using VLANs. Each SSID should have its own VLAN, with strict 802.1Q packet tagging maintained all the way from the access point to the firewall or router.<\/li>\n<li>Implement stricter packet inspection at the routing level \u2014 depending on the hardware capabilities. Features like Dynamic ARP Inspection, DHCP snooping, and limiting the number of MAC addresses per port help defend against IP\/MAC spoofing.<\/li>\n<li>Enable individual GTK keys for each client, if your equipment supports it.<\/li>\n<li>Use more resilient RADIUS and 802.1X settings, including modern cipher suites and robust shared secrets.<\/li>\n<li>Log and analyze EAP\/RADIUS authentication anomalies in your SIEM. This helps track many attack attempts beyond just AirSnitch. Other red flag events to watch for include the same MAC address appearing on different SSIDs, spikes in ARP requests, or clients rapidly jumping between BSSIDs or VLANs.<\/li>\n<li>Apply security at higher levels of the network topology. Many of these attacks lose their punch if the organization has universally implemented TLS and HSTS for all business application traffic, requires an active VPN for all Wi-Fi connections, or has fully embraced a Zero Trust architecture.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>How the AirSnitch vulnerability family threatens corporate networks, and what changes you need to make to your network architecture and settings to stay protected.<\/p>\n","protected":false},"author":2722,"featured_media":55598,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052],"tags":[359,261,422,709,268,174,3884],"class_list":{"0":"post-55597","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-authentication","11":"tag-encryption","12":"tag-threats","13":"tag-vpn","14":"tag-vulnerabilities","15":"tag-wi-fi","16":"tag-zero-trust"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/airsnitch-wi-fi-client-isolation-guest-network-vulnerability-and-mitigation\/55597\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/airsnitch-wi-fi-client-isolation-guest-network-vulnerability-and-mitigation\/41691\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/airsnitch-wi-fi-client-isolation-guest-network-vulnerability-and-mitigation\/30551\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/wi-fi\/","name":"wi-fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=55597"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55597\/revisions"}],"predecessor-version":[{"id":55599,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55597\/revisions\/55599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/55598"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=55597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=55597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=55597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}