In what has been a tightly guarded message to manufacturers of WiFi Access Points, it has now been revealed that the long-trusted WPA2 security protocol has been compromised.
Proof of Concept Compromise
The Proof of Concept (PoC) exploit has been nick-namedÂ “KRACK” – short for “Key Reinstallation AttaCKs” by the security researches who discovered this compromise. Â The United States Computer Emergency Readiness Team (CERT) has raised multiple CVE references:
The vulnerability exploits aÂ flaw by re-sending and re-using an encryption key that is only supposed to be used once.
Different devices are at higher risk than others – for example Apple’s mobile iOS-based devices are at less risk an its fully-fledged MacOS operating system
US-CERT has advised:
“US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. Â The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.“
While many vendors are as-yetÂ still to provide fixes, Ubiquiti and Aruba have already provided updates. Â Apple has advised that the patch for KRACK is available in the latest betas of its operating systems, soon to be rolled out for general use.
On a personal note, I was extremely impressed how quickly Ubiquiti responded to this. Â For those with Beta access to their forums, you can download AP and Switch versionÂ 188.8.131.5237 here.
It’s not clear how many vendors will provide fixes, nor how quickly. Â What is clear is that there will likely be many older devices that will remainÂ unpatched.