cancel
Showing results for 
Search instead for 
Did you mean: 

KRACK attack on WPA2

KRACK attack on WPA2

Johannes_Dennin
New Contributor
Hello everyone,
I have some questions due to the expected disclosure today on the attack possible on WPA2 SSIDs.
US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.


Link: https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-tra...

- Is Extreme aware of this?
- Are Fixes ready to be released?
- Is a software fix sufficient or does hardware need to be replaced?

Thanks and best regards,

Johannes
82 REPLIES 82

Drew_C
Valued Contributor III
I've asked the WiNG and IdentiFi teams for an update. I'll share with the thread when I have more information.

Kyle_Stanford
New Contributor
I already have fixes for other vendor devices, but need them for the WiNG access points also, so same question.

Johannes_Dennin
New Contributor

JP4
New Contributor II
A different article I read indicated that vendors were made aware of this a couple months ago. Hoping that maybe the fixes were put into a recent firmware release ?

Daniel_Bernhard
New Contributor
The corresponding paper:
"Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"
https://papers.mathyvanhoef.com/ccs2017.pdf

GTM-P2G8KFN