cancel
Showing results for 
Search instead for 
Did you mean: 

KRACK attack on WPA2

KRACK attack on WPA2

Johannes_Dennin
New Contributor
Hello everyone,
I have some questions due to the expected disclosure today on the attack possible on WPA2 SSIDs.
US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.


Link: https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-tra...

- Is Extreme aware of this?
- Are Fixes ready to be released?
- Is a software fix sufficient or does hardware need to be replaced?

Thanks and best regards,

Johannes
84 REPLIES 84

JP4
New Contributor II
A different article I read indicated that vendors were made aware of this a couple months ago. Hoping that maybe the fixes were put into a recent firmware release ?

Daniel_Bernhard
New Contributor
The corresponding paper:
"Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"
https://papers.mathyvanhoef.com/ccs2017.pdf

Johannes_Dennin
New Contributor
I was just asking because other vendors apparently have updates available / in beta. But I guess we'll see soon what all the fuss is about!

Ronald_Dvorak
Honored Contributor
Hi Johannes,

Extreme is fast but not that fast, from what I'd read in the web the guys that found the vulnerability will release more information how it works in 5 hours.

I'm very confident that Extreme will implement a fix.

Cheers,
Ron

Please take a look into the Vulnerability Notice.....

https://extremeportal.force.com/ExtrArticleDetail?n=000018005
GTM-P2G8KFN