This is a major development. WPA2 is the standard for about +90% of wireless security on the planet. We are researching options with manufacturers to automatically patch our customers. Please reach out to us to assist with current manufacturer status and plan to address the exploit. Below are some items to help keep your network safe.

  1. Mitigate the risks caused by a MitM attack. Enabling rogue detection to stop spoofed MACs as a malicious threat. Further, admins can enable APs to protect against Man-in-the-Middle attacks by deauth’ing clients connecting to a malicious rogue AP, which is required to carry out this attack.
  2. Eliminate the 802.11r vulnerability. If it is enabled on your network, consider disabling it until a fix is in place.
  3. The WPA/WPA2 protocol is not fundamentally flawed. This means that exposure is limited and fixable without throwing out WPA2 altogether. Software/firmware patches that address this are already being rolled out. It is important to remember that, while concretely feasible, these attacks require not only access to your network, but a degree of knowledge and sophistication. We always recommend that anyone interested in securing their WLAN network should perform regular audits of their security infrastructure and procedures to ensure everything is in compliance with best practices and vendor recommendations.

To learn more please visit https://www.krackattacks.com

“The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected.”