T 2.117 Lack of, or inadequate, planning of the use of WLAN

A WLAN must be carefully planned and installed so that any existing security gaps cannot adversely affect any IT system connected to the WLAN. When care is not taken, the result could even be the compromising of the government agency or company network connected to the inadequately secured WLAN. Security gaps can also result when the security mechanisms between the LAN and WLAN are not configured properly, for example due to inadequate planning when dividing the users into user groups.

A number of problems can arise from a lack of, or inadequate, planning of WLAN usage, for example the following:

An additional threat is posed to the LAN when there is only one inadequately protected connection between the access points or distribution system and the cable-bound infrastructure. If there is no physical or logical protection at the level of the distribution system, then the entire broadcast domain in which an access point is located can be listened in on after compromising the protection of the wireless interface or security settings of the access point. The information obtained could then be used for an attack on the entire LAN.

Example:

If the filter rules are specified too loosely for the security gateway on the transfer point located between the distribution system and the LAN, then an attacker could tunnel into this transfer point using a man-in-the-middle attack by cleverly manipulating the communication data and therefore gain access to the internal LAN infrastructure. A prerequisite for this type of attack is that either the security mechanisms on the wireless interface are compromised or direct access to the distribution system is available. In addition, vulnerabilities at the operating system level can also be used for tunnelling purposes if the systems of the transfer point have not been adequately hardened.