Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 358

Dragonblood

What is Dragonblood?

DragonbloodA family of side-channel and downgrade attacks against WPA3 SAE (Dragonfly) that can leak the Wi-Fi password to a nearby attacker.


Dragonblood was disclosed in April 2019 by Mathy Vanhoef and Eyal Ronen. It targets the Simultaneous Authentication of Equals (SAE) handshake, also called Dragonfly, used by WPA3-Personal. The researchers found timing and cache-based side channels in the hunt-and-peck password-element derivation, plus group-downgrade and transition-mode attacks that force clients onto vulnerable curves or back to WPA2. With a captured side-channel trace, an attacker can run an offline password-partitioning attack to recover the PSK. CVEs include CVE-2019-9494 and CVE-2019-9495. Fixes published in WPA3 Dragonfly hash-to-curve (Hash-to-Element) plus patched hostapd/wpa_supplicant address the leaks, but transition-mode deployments remain risky.

Examples

  1. 01

    Timing leak in hunt-and-peck lets an attacker recover a weak WPA3 passphrase offline.

  2. 02

    Forcing a client into WPA2 transition mode to perform a classic offline PMKID crack.

Frequently asked questions

What is Dragonblood?

A family of side-channel and downgrade attacks against WPA3 SAE (Dragonfly) that can leak the Wi-Fi password to a nearby attacker. It belongs to the Attacks & Threats category of cybersecurity.

What does Dragonblood mean?

A family of side-channel and downgrade attacks against WPA3 SAE (Dragonfly) that can leak the Wi-Fi password to a nearby attacker.

How does Dragonblood work?

Dragonblood was disclosed in April 2019 by Mathy Vanhoef and Eyal Ronen. It targets the Simultaneous Authentication of Equals (SAE) handshake, also called Dragonfly, used by WPA3-Personal. The researchers found timing and cache-based side channels in the hunt-and-peck password-element derivation, plus group-downgrade and transition-mode attacks that force clients onto vulnerable curves or back to WPA2. With a captured side-channel trace, an attacker can run an offline password-partitioning attack to recover the PSK. CVEs include CVE-2019-9494 and CVE-2019-9495. Fixes published in WPA3 Dragonfly hash-to-curve (Hash-to-Element) plus patched hostapd/wpa_supplicant address the leaks, but transition-mode deployments remain risky.

How do you defend against Dragonblood?

Defences for Dragonblood typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Dragonblood?

Common alternative names include: WPA3 SAE side-channel, Dragonfly attack.

Related terms