View All Alerts & Outages

Patches available for Wi-Fi encryption protocol ("KRACK" attack)

Following our prior announcement (appended below) regarding vulnerabilities in the WPA/WPA2 Wi-Fi encryption protocols (“KRACK” attack), we wanted to pass along references to some of the major vendors who have released patches for these vulnerabilities. Notably, patches for both Android and Apple products are still pending.

Windows 7, 8, 8.1, 10: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080

Intel Wi-Fi: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00101&languageid=en-fr

Aruba: http://support.arubanetworks.com/LifetimeWarrantySoftware/tabid/121/DMXModule/661/EntryId/27269/Default.aspx

Debian: https://www.debian.org/security/2017/dsa-3999

Red Hat: https://access.redhat.com/security/vulnerabilities/kracks

Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa

Fortinet: http://docs.fortinet.com/uploaded/files/3961/fortiap-v5.6.1-release-notes.pdf

Linksys: https://www.linksys.com/us/support-article?articleNum=246427

Netgear: https://kb.netgear.com/000049498/Security-Advisory-for-WPA-2-Vulnerabilities-PSV-2017-2826-PSV-2017-2836-PSV-2017-2837

Ubiquiti: https://community.ubnt.com/t5/UniFi-Updates-Blog/FIRMWARE-3-9-3-7537-for-UAP-USW-has-been-released/ba-p/2099365

Raspberry Pi: https://raspberrypi.stackexchange.com/questions/73879/rpi-vulnerable-for-wi-fi-wpa2-krack-attack/73908#73908


We recommend applying the patches referenced above for all affected equipment.  Please contact your Local Support Provider(LSP) if you have any questions or need support for any University-supported devices.

If you are not sure who your LSP is, you may find them at:

https://www.isc.upenn.edu/get-it-help