{"id":1879,"date":"2017-10-16T13:07:13","date_gmt":"2017-10-16T13:07:13","guid":{"rendered":"http:\/\/www.mtin.net\/blog\/?p=1879"},"modified":"2017-10-16T13:07:13","modified_gmt":"2017-10-16T13:07:13","slug":"vulnerability-in-wpa2","status":"publish","type":"post","link":"http:\/\/www.mtin.net\/blog\/vulnerability-in-wpa2\/","title":{"rendered":"Vulnerability in WPA2"},"content":{"rendered":"<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/10\/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping\/\">https:\/\/arstechnica.com\/information-technology\/2017\/10\/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping\/<\/a><\/p>\n<p><em>An air of unease set into the security circles on Sunday as they prepared for the disclosure of high-severity vulnerabilities in the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Wi-Fi_Protected_Access\">Wi-Fi Protected Access II protocol<\/a>\u00a0that make it possible for attackers to eavesdrop Wi-Fi traffic passing between computers and access points.<\/em><\/p>\n<p><em>The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research has been a closely guarded secret for weeks ahead of a coordinated disclosure that&#8217;s scheduled for <\/em>8am<em> Monday, East Coast time. An advisory the\u00a0<a href=\"https:\/\/www.us-cert.gov\/\">US CERT<\/a>\u00a0recently distributed to about 100 organizations described the research this way:<\/em><\/p>\n<blockquote><p>US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT\/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>From Mikrotik:<\/p>\n<div class=\"body\">\n<div class=\"quotecontent\">On October 16. CERT\/CC\/ICASI released a public announcement about discovered vulnerabilities in WPA2 handshake protocols that affect most WiFi users and all vendors world wide.<br \/>\nRouterOS v6.39.3, v6.40.4, v6.41rc are not affected!<br \/>\nIt is important to note that the vulnerability is discovered in the protocol itself, so even a correct implementation is affected.<br \/>\nThese organizations did contact us earlier, so we have already released fixed versions that address the outlined issues. Not all of the discovered vulnerabilities directly impact RouterOS users, or even apply to RouterOS, but we did follow all recommendations and improved the key exchange process according to the guidelines we received from the organizations who discovered the issue.<br \/>\nWe released fixed versions last week, so if you upgrade your devices routinely, no further action is required.<br \/>\nCWE-323<br \/>\nCVE-2017-13077<br \/>\nCVE-2017-13078<br \/>\nCVE-2017-13079<br \/>\nCVE-2017-13080<br \/>\nCVE-2017-13081<br \/>\nCVE-2017-13082<br \/>\nCVE-2017-13083<br \/>\nCVE-2017-13084<br \/>\nCVE-2017-13085<br \/>\nCVE-2017-13086<br \/>\nCVE-2017-13087<\/div>\n<\/div>\n<footer><\/footer>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/arstechnica.com\/information-technology\/2017\/10\/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping\/ An air of unease set into the security circles on Sunday as they prepared for the disclosure of high-severity vulnerabilities in the\u00a0Wi-Fi Protected Access II protocol\u00a0that make it possible for attackers to eavesdrop Wi-Fi traffic passing between computers and access points. The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1799,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[274],"tags":[489,490,25,491,384,488],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2017\/09\/download.jpg?fit=236%2C213","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6VLMf-uj","jetpack-related-posts":[{"id":3411,"url":"http:\/\/www.mtin.net\/blog\/what-is-wpa3\/","url_meta":{"origin":1879,"position":0},"title":"What is WPA3?","author":"j2sw","date":"April 21, 2019","format":false,"excerpt":"With the introduction of WIFI6, we now have the new WPA standard in WPA3. In an earlier article, I talk about WIFI6, and it's the introduction of WPA3. As we are used to with the previous versions of WPA, WPA3 comes in two \"flavors. We have WPA personal and WPA\u2026","rel":"","context":"In &quot;MTIN&quot;","block_context":{"text":"MTIN","link":"http:\/\/www.mtin.net\/blog\/category\/mtin\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2019\/04\/encryption-head-640x353.jpg?fit=640%2C353&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1798,"url":"http:\/\/www.mtin.net\/blog\/wpa-is-not-encrypting-your-customer-traffic\/","url_meta":{"origin":1879,"position":1},"title":"WPA is not encrypting your customer traffic","author":"j2sw","date":"September 11, 2017","format":false,"excerpt":"There was a Facebook discussion that popped up tonight about how a WISP answers the question \"Is your network secure?\" There were many good answers and the notion of WEP vs WPA was brought up. In today's society, you need end-to-end encryption for data to be secure. An ISP has\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"http:\/\/www.mtin.net\/blog\/category\/networking\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2017\/09\/download.jpg?fit=236%2C213&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1373,"url":"http:\/\/www.mtin.net\/blog\/homeland-security-us-cert-e-mail-on-network-infrastructure\/","url_meta":{"origin":1879,"position":2},"title":"Homeland Security US-Cert e-mail on Network infrastructure","author":"j2sw","date":"September 7, 2016","format":false,"excerpt":"A few days ago Homeland Security published an e-mail on threats to network devices and securing them. \u00a0Rather than cut and paste I exported the e-mail to a PDF. Some good best practices in here. TA16250A The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations","rel":"","context":"In &quot;Data Center&quot;","block_context":{"text":"Data Center","link":"http:\/\/www.mtin.net\/blog\/category\/data-center\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2876,"url":"http:\/\/www.mtin.net\/blog\/mtin-flash-briefing-february-282019\/","url_meta":{"origin":1879,"position":3},"title":"MTIN Flash Briefing February 28,2019","author":"j2sw","date":"February 28, 2019","format":false,"excerpt":"\u00a0Amazon\u00a0and\u00a0eero\u00a0announced that Amazon will acquire\u00a0eero. eero\u2019s home mesh Wi-Fi systems set up in minutes and blanket every room of a customer\u2019s home in high-performing, reliable Wi-Fi. https:\/\/www.bbcmag.com\/breaking-news\/amazon-to-acquire-eero-for-better-connection-of-smart-home-devices Cambium has published the results of their recent WISP survery https:\/\/www.cambiumnetworks.com\/blog\/voice-of-the-wisp\/ Most IPV4 addresses are going for around $20 at auction and brokers\u2026","rel":"","context":"In &quot;FlashBriefing&quot;","block_context":{"text":"FlashBriefing","link":"http:\/\/www.mtin.net\/blog\/category\/flashbriefing\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2019\/01\/session-clipart-CLIPART_OF_18552_SM_2.jpg?fit=640%2C480&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2632,"url":"http:\/\/www.mtin.net\/blog\/cambium-cnpilot-e430w-802-11ac-first-look\/","url_meta":{"origin":1879,"position":4},"title":"Cambium cnPilot e430w 802.11ac first look","author":"j2sw","date":"November 18, 2018","format":false,"excerpt":"Some photos of the Cambium cnPilot e430w 802.11ac wave 2 dual-band wi-fi wall plate access point. Some Features -802.11AC Wave 2 -2x2 MU-MIMO streams. -Max Data Rates 1.3 Gbps. 867 Mbps (5 GHz), 400 Mbps (2.4 MHz) -16 SSIDs across 2 radios Link to more info","rel":"","context":"In &quot;Cambium&quot;","block_context":{"text":"Cambium","link":"http:\/\/www.mtin.net\/blog\/category\/cambium\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2018\/11\/img_0719.jpg?fit=1200%2C1114&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2018\/11\/img_0719.jpg?fit=1200%2C1114&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2018\/11\/img_0719.jpg?fit=1200%2C1114&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2018\/11\/img_0719.jpg?fit=1200%2C1114&resize=1050%2C600 3x"},"classes":[]},{"id":2834,"url":"http:\/\/www.mtin.net\/blog\/enterprise-wifi-at-home\/","url_meta":{"origin":1879,"position":5},"title":"Enterprise Wifi at home","author":"j2sw","date":"February 7, 2019","format":false,"excerpt":"ARS Technia has a very informative article on unifi\u00a0pro gear in a home environment.\u00a0 Very good, but long read. https:\/\/arstechnica.com\/information-technology\/2018\/07\/enterprise-wi-fi-at-home-part-two-reflecting-on-almost-three-years-with-pro-gear\/","rel":"","context":"In &quot;UBNT&quot;","block_context":{"text":"UBNT","link":"http:\/\/www.mtin.net\/blog\/category\/ubnt\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2018\/03\/bandwidth-600x400.jpg?fit=600%2C400&resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/1879"}],"collection":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/comments?post=1879"}],"version-history":[{"count":1,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/1879\/revisions"}],"predecessor-version":[{"id":1880,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/1879\/revisions\/1880"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/media\/1799"}],"wp:attachment":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/media?parent=1879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/categories?post=1879"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/tags?post=1879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}