[aklug] KRACK attack on WiFi at the protocol level (*all* clients affected)

Royce Williams royce at tycho.org
Mon Oct 16 06:23:42 AKDT 2017


Flaw with the protocol itself - so *anything* speaking Wi-Fi will need
to be patched, including the long tail of legacy, EOL, and cheap IoT
gear that will likely never be patched. Assume all Wi-Fi networks are
observable until then (core mitigations is to use a VPN). Long term,
recommend adding to RFPs for any gear (not just wireless) to ensure
updates for X period of time.

Main announcement:
    https://www.krackattacks.com/

Paper with background:
    https://papers.mathyvanhoef.com/ccs2017.pdf

I will assemble what I know here:
    http://www.techsolvency.com/story-so-far/krackattack/

Other good meta-threads and summaries, keep an eye on these:
    https://github.com/kristate/krackinfo
    https://www.reddit.com/r/sysadmin/comments/76lj5q/this_is_a_core_protocollevel_flaw_in_wpa2_wifi/


Per-vendor stuff:

Aruba:
    http://community.arubanetworks.com/t5/Wireless-Access/Core-level-protocol-flaw-in-WPA2/td-p/310038
    http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007_FAQ_Rev-1.pdfhttp://www.arubanetworks.com/support-services/security-bulletins/

wpa_supplicant:
    https://w1.fi/cgit/hostap/commit/


News:

https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/
https://www.alexhudson.com/2017/10/15/wpa2-broken-krack-now/


CVEs:

CWE-323
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13083
CVE-2017-13084
CVE-2017-13085
CVE-2017-13086
CVE-2017-13087

Royce


More information about the aklug mailing list