You might be obviously aware by now about the vulnerability in the WPA2 wireless Protocol (affecting most of the wifi devices) which could allow attackers to eavesdrop on the traffic between computer and wireless access points.
You might be obviously aware by now about the vulnerability in the WPA2 wireless Protocol (affecting most of the wifi devices) which could allow attackers to eavesdrop on the traffic between computer and wireless access points.
What you should know:
- Only an unpatched device that connects over WPA2 is under threat
- Vulnerability doesn't reveal the WPA2 key. It only allows parts of the communication to be sniffed.
- Since most WiFi communications these days are likely to be HTTPS and SMTP-S the attacker would end up sniffing only TLS encrypted traffic.
- Till now there are no reports of any widespread attacks based on this issue.
- Windows and iOS users (with the latest software) are not vulnerable to the sniffing attack
- Android devices and routers from popular vendors are affected and some of them have already released some patches to prevent key reuse.
Companies who have rolled out updates and advisory on this issue
Arch Linux , Aruba Networks, DD-WRT, Debian, FortinetIntel, Linux, Meraki, MikroTik, OpenBSD, Open-Mesh & CloudTraxpfSense, Red Hat, Turris Omnia, Ubiquiti, Ubuntu, WatchGuardWiFi Alliance,ZyxelEspressif
ESP-IDF, ESP8266 RTOS SDK, & ESP8266 NONOS SDK on their Github page.Netgear
Updated have been released for productsWN604, WNDAP620, WAC720/WAC730, WNAP210v2, WNDAP660, WND930, WAC505 / WAC510, WAC120, WNAP320, & WNDAP350.Microsoft
Microsoft has already released the patch for the vulnerability in the October 10th security updates. Kindly request users to update it as soon as possible.Companies which announced patched will be available soon: Lede, Belkin, Linksys, Wemo, Cisco, Fedora, Toshiba, TP-Link, FreeBSDHow to protect yourself?
1) We advise users to update their firmware as soon as the update is available. For old products, users may need to login into their WiFi console and check for patches2) When accessing highly confidential information try to add an extra layer of encryption ( for example VPN).3) Always try to use HTTPS if it is available for the website you are visiting. It is recommended that you may use a browser plugin like HTTPS Everywhere4) Always use an extra layer of encryption for all your network traffics which carry sensitive innhold by using technologies such as Secure Shell, and other reliable protocols to encrypt.4) All the home users are requested to change the admin login password from the default.Read more on:WPA2 protocol is vulnerable to eavesdropping - almost all devices are affected!