By entering this site you need to consent to the use of cookies and their functional use according to this privacy policy. Cookies help us to provide the functional services of the website. Kindly read the below message of use and consent to the use.
The following cookies are stored and shared when accessing this website:
- Internal cookies for the MediaWiki site. This is used for user authentication and article modifications.
- Third-party cookies from Google providing services for Google AdSense and Google Analytics
We will never use data collected outside of the above scope.
This section documents vulnerabilities for [https://github.com/Kinnay/NintendoClients/wiki/Pia-Overview Pia].
{| class="wikitable" border="1"
{| class="wikitable" border="1"
Line 1,066:
Line 1,066:
| November 15, 2022
| November 15, 2022
| [[User:Yellows8|yellows8]]
| [[User:Yellows8|yellows8]]
+
|-
+
| Optional Pia packet encryption
+
| Pia packet encryption is optional. If the encryption flag is disabled, the packet handler will accept it and skip crypto.
+
In fixed versions immediately after grabbing a packet, it now checks the crypto flag. If it's plaintext the packet is dropped.
+
+
This can be used to send a plaintext Pia packet without needing to handle encryption, especially useful if the session-key can't be obtained (online-play matchmaking). This could be combined with other vulns if wanted.
+
| Sending a plaintext Pia packet without needing to handle encryption.