UIU Blog

Krack Wi-Fi vulnerability
We at Big Bang have been following the news regarding the WPA2 hack known as Krack (key reinstallation attack).

During the week of October 16, 2017, researchers announced the discovery of a vulnerability which exploits the WPA2 protocol and allows attackers to steal sensitive information from unencrypted communications. It may also allow attackers to inject code (presumably malware) into websites.

"It’s important to keep the impact of KRACK in perspective: KRACK does not affect HTTPS traffic, and KRACK’s discovery does not mean all Wi-Fi networks are under attack."

The list of Wi-Fi vendors/chipset manufacturers is extensive and Big Bang is in the process of searching/monitoring each vendor for updates to their wi-fi network drivers that specifically address the Krack vulnerability. This process is entirely subject to the availability of adequately-prepared drivers by the chipset manufacturers. We anticipate that this update will take place over a lengthy period of time and in fact, may not be realized for those vendors that are out of business, no longer supporting versions of chipsets or are not prepared to update their device drivers.

If you become aware of a wi-fi network driver that specifically addresses the Krack vulnerability and you suspect that we have not yet encountered that driver, please bring it to the immediate attention of Big Bang Support.

Thank you for your patience and assistance.

For additional information, please refer to the following links:
KRACK Vulnerability: What You Need To Know
Key Reinstallation Attacks: Breaking WPA2 by forcing nonce reuse
Here’s what you can do to protect yourself from the KRACK WiFi vulnerability


Comments are closed.
Showing 0 Comment


Archives

  • 2019
  • 2018
  • 2017
  • 2015
  • 2014
  • 2013
  • 2012