You may have heard news this week of a vulnerability found in WPA2 that can affect your wireless network security.
The WPA2 KRACK exploit takes advantage of fundamental design flaws in the WPA2 protocol. The original design was used to secure wireless networks, but now could theoretically lead to man-in-the-middle (MITM) attacks using key reinstallation attacks (KRACKS). When exploited, cyber criminals can steal confidential information like email, credit card numbers, passwords and more.
Who is affected?
If your network or device supports WiFi then you are most likely affected. Although it’s not obvious to the average user, WPA2 is the most popular and widely used wireless security protocol. If your network or devices are connected to WiFi, then you are most likely vulnerable to the KRACK Exploit.
What exactly is a MITM attack?
In a nutshell, a MITM attack is when a cyber criminal securely relays and possibly alters information shared between two parties who believe they are directly communicating with each other (in this case between the client machine on the wireless network and the wireless access point).
What exactly is a KRACK?
In a key reinstallation attack, the cyber-criminal tricks a victim into reinstalling an already-in-use key. To guarantee security, a key should only be installed and used once. Unfortunately, this is not guaranteed by the WPA2 protocol. By manipulating cryptographic handshakes, cyber criminals can abuse this weakness.
The WPA2 design flaws are protocol level vulnerabilities and not specific to any one vendor’s implementation. Wireless access points and wireless clients are susceptible. You can find more details on the vulnerabilities at www.krackattacks.com .
What can you do to mitigate the impact this exploit has on your wireless network?
- Patch all Windows, Linux, Android, iOS and macOS clients with the latest updates from those vendors.
- Apply any firmware updates for physical devices like wireless access points.
SumnerOne recommends and implements wireless solutions from several vendors and we are working very closely with those vendors to ensure that our client’s networks are safe and secure.
Originally published October 20, 2017, updated April 20, 2018