
A security researcher Mathy Van Hoef will disclose a vulnerability in WPA2 within a few hours.
The vulnerability leaves Wi-Fi traffic open to eavesdropping and it will be possible to inject malicious content and much more.
CVE’s
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
Important URLs
https://www.krackattacks.com/
https://github.com/valentijnscholten/krackattacks/
Van Hoef on Twitter
https://twitter.com/vanhoefm
::Updates::
From Krackattacks.com
Our main attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to confirm that both the client and access point possess the correct credentials (e.g. the pre-shared password of the network). At the same time, the 4-way handshake also negotiates a fresh encryption key that will be used to encrypt all subsequent traffic. Currently, all modern protected Wi-Fi networks use the 4-way handshake. This implies all these networks are affected by (some variant of) our attack. For instance, the attack works against personal and enterprise Wi-Fi networks, against the older WPA and the latest WPA2 standard, and even against networks that only use AES. All our attacks against WPA2 use a novel technique called a key reinstallation attack (KRACK):
- Basically all Wireless networks are vulnerable and the vendors are working to get the patches out.
- Microsoft was mitigating this on the client side in the October patch release cycle
- If you won’t get an update to your router your really only option is to get a new one (if it’s out of support)
- Recommendations are to apply patches as soon as they’re available.
This post will be updated