[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.

[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
149 Reply
Re:[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol
2018-02-20 14:28:47

JPT wrote

And the V3 is still a couple years down-level. Likely will never be updated. Time to upgrade to an actual supported router vendor or bite the bullet and load 3rd party firmware to eliminate this poor support.


I don't understand. V2 and V4 were updated. Are they not going to update the V3 starting in the US version?
As far as I know the V3 was created to not allow the usage of 3rd party firmware which is still possible in prior versions.
  0  
  0  
#144
Options
Re:[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol
2018-03-26 07:18:43
Being that the C7 will not be affected if used in the default router mode or set it up as an access point. Should I still disable the router's WSP?
  0  
  0  
#145
Options
Re:[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol
2018-03-27 16:21:27
no need

FrankieB wrote

Being that the C7 will not be affected if used in the default router mode or set it up as an access point. Should I still disable the router's WSP?
  0  
  0  
#146
Options
Re:Re:[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol
2019-07-31 05:58:59

@zakporter 

 

We have released the firmware to fix the WPA2 Security (KRACKs) Vulnerability for Archer C7 V2 EU version already. 

 

Click here to get the firmware.

 

 

  0  
  0  
#152
Options
Re:Re:[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol
2019-07-31 09:46:37

@zakporter 

 

Thanks for your feedback, seems that the latest firmware is invisible in UK website now. We will remind our engineer to update it.

 

For your case, you can go  to global official website to get the latest firmware which fixed the  KRACK issue.

https://www.tp-link.com/en/support/download/archer-c7/v2/#Firmware 

 

Good day. 

 

 

  1  
  1  
#156
Options
Re:Re:Re:Re:[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol
2019-08-01 08:14:44

@zakporter 

 

The EU version uses English, please be assured about it.

 

And the UK site uses the EU version as well. 

 

Meanwhile, we will update the firmware on the UK site soon. 

 

  0  
  0  
#158
Options
Re:Re:[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol
2019-08-05 01:14:19

@zakporter 

 

You are welcome, any further problem, please let us know.

 

Good day. 

 

  0  
  0  
#161
Options
Re:[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol
2020-03-02 11:56:35

@zakporter 

 

Hello, we are working on it right now. Any updates, we will keep you posted immediately. 

 

You can keep an eye on our official websites as well. 

 

Thanks for your support and patience in advance. 

 

  0  
  0  
#170
Options
Re:[Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol
2020-03-04 11:17:49

@zakporter Actually krack and krook are completely different, one (krack) exposes an entire connection between two devices as the vulnerable parts won't encrypt any packet at all. That's indeed a security problem because someone could access the whole data flow, manipulate it, etc.

 

Krook, on the other side, only exposes a pending buffer when WiFi connection closes. But, except that final pending buffer, all the data flow is encrypted as expected, so it's not so severe and the probability of getting sensitive information from that small buffer is quite low. And even less considering most apps and sites now run over https which is, itself, encrypted (and that is not affected).

 

So, yes, it's a security issue because there's some data leakage, but it's not the new krack.

  0  
  0  
#173
Options
Related Articles