KRACK attack on WPA2

  • 7
  • 13
  • Problem
  • Updated 2 months ago
  • Solved
  • (Edited)
Hello everyone,
I have some questions due to the expected disclosure today on the attack possible on WPA2 SSIDs.
US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.


Link: https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-tra...

- Is Extreme aware of this?
- Are Fixes ready to be released?
- Is a software fix sufficient or does hardware need to be replaced?

Thanks and best regards,

Johannes
Photo of Johannes Denninger

Johannes Denninger

  • 492 Points 250 badge 2x thumb

Posted 4 months ago

  • 7
  • 13
Photo of Drew C.

Drew C., Community Manager

  • 35,706 Points 20k badge 2x thumb
Official Response
Hello everyone.The VN has been updated with more complete information. It will continue to be updated as needed. I'll also post here when updates are made. When I get back to the office tomorrow, I'll work on getting an email sent out to the subscribers of the notification service.

VN2017-005 - KRACK, WPA2 Protocol Flaw