A security researcher Mathy Van Hoef will disclose a vulnerability in WPA2 within a few hours.
The vulnerability leaves Wi-Fi traffic open to eavesdropping and it will be possible to inject malicious content and much more.
Van Hoef on Twitter
Our main attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to confirm that both the client and access point possess the correct credentials (e.g. the pre-shared password of the network). At the same time, the 4-way handshake also negotiates a fresh encryption key that will be used to encrypt all subsequent traffic. Currently, all modern protected Wi-Fi networks use the 4-way handshake. This implies all these networks are affected by (some variant of) our attack. For instance, the attack works against personal and enterprise Wi-Fi networks, against the older WPA and the latest WPA2 standard, and even against networks that only use AES. All our attacks against WPA2 use a novel technique called a key reinstallation attack (KRACK):
- Basically all Wireless networks are vulnerable and the vendors are working to get the patches out.
- Microsoft was mitigating this on the client side in the October patch release cycle
- If you won’t get an update to your router your really only option is to get a new one (if it’s out of support)
- Recommendations are to apply patches as soon as they’re available.
This post will be updated