Following our prior announcement (appended below) regarding vulnerabilities in the WPA/WPA2 Wi-Fi encryption protocols (“KRACK” attack), we wanted to pass along references to some of the major vendors who have released patches for these vulnerabilities. Notably, patches for both Android and Apple products are still pending.
Windows 7, 8, 8.1, 10: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
Intel Wi-Fi: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00101&languageid=en-fr
Debian: https://www.debian.org/security/2017/dsa-3999
Red Hat: https://access.redhat.com/security/vulnerabilities/kracks
Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
Fortinet: http://docs.fortinet.com/uploaded/files/3961/fortiap-v5.6.1-release-notes.pdf
Linksys: https://www.linksys.com/us/support-article?articleNum=246427
Raspberry Pi: https://raspberrypi.stackexchange.com/questions/73879/rpi-vulnerable-for-wi-fi-wpa2-krack-attack/73908#73908
We recommend applying the patches referenced above for all affected equipment. Please contact your Local Support Provider(LSP) if you have any questions or need support for any University-supported devices.
If you are not sure who your LSP is, you may find them at: