Fix for WPA / WPA2 KRAck Attacks ?

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.

Fix for WPA / WPA2 KRAck Attacks ?

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
Fix for WPA / WPA2 KRAck Attacks ?
Fix for WPA / WPA2 KRAck Attacks ?
2017-10-16 21:24:30
Hi there,

I am wondering when we will see a firmware fix for the just published WPA2 vulnerability "KRAck attacks". ?




  0      
  0      
#1
Options
7 Reply
Re:Fix for WPA / WPA2 KRAck Attacks ?
2017-10-17 00:01:02
Can we believe this page ( http://www.tp-link.com/en/security) ?
  0  
  0  
#2
Options
Re:Fix for WPA / WPA2 KRAck Attacks ?
2017-10-17 00:52:49
+1. This is a serious flaw and needs to be patched quickly.
  0  
  0  
#3
Options
Re:Fix for WPA / WPA2 KRAck Attacks ?
2017-10-17 11:45:10
I would also like to know when and if a security patch is coming. I see other brands are already posting patches for their routers.
  0  
  0  
#4
Options
Re:Fix for WPA / WPA2 KRAck Attacks ?
2017-10-17 16:04:57
Could someone inform us which models are affected?

Is Archer D2 vulnerable?
Firmware Version:1.4.0 0.8.0 v003e.0 Build 160216 Rel.55536n
Hardware Version:Archer D2 v1 00000001
  0  
  0  
#5
Options
Re:Fix for WPA / WPA2 KRAck Attacks ?
2017-10-17 19:26:48

nikant wrote

Could someone inform us which models are affected?
Is Archer D2 vulnerable?
Firmware Version:1.4.0 0.8.0 v003e.0 Build 160216 Rel.55536n
Hardware Version:Archer D2 v1 00000001


All models are affected as its a flaw in the WPA2 Protocol itself regardless of what hardware or firmware revision is in use, until TP-Link release a version that fixes the WPA2 flaw itself.
  0  
  0  
#6
Options
Re:Fix for WPA / WPA2 KRAck Attacks ?
2017-10-17 20:24:57
  0  
  0  
#7
Options
Re:Fix for WPA / WPA2 KRAck Attacks ?
2017-10-17 22:00:45
Please email customer support to ask them about this - the more contacts they get there, the more likely they are to do something useful.
  0  
  0  
#8
Options