Is your router receiving the attention it needs in light of the KRACK WPA2 Wi-Fi hack?
An exploit that has taken the "protected" out of Wi-Fi Protected Access II (WPA2) means that your wireless network is likely not as safe as you once thought. What security researcher Mathy Vanhoef is calling "KRACK" attacks the handshake portion of the WPA2 protocol. Mobile Nations Senior Editor Jerry Hildenbrand put together a comprehensive guide on exactly how the exploit works and how you can protect yourself, also mentioning some information on patches containing a fix. To help you stay on top of which vendors are patching the vulnerability, we rounded them up here.
Router vendors that have issued KRACK patches
As mentioned in Hildenbrand's article, the best way to protect yourself from this exploit is to not use Wi-Fi at all until a proper fix has been proven. CERT has released notes on the KRACK problem, including a list of vendors whose equipment is vulnerable.
Some security-minded companies have already worked on fixes and are offering patches. Check back often, as we will keep this list updated.
- Arch Linux: WPA Supplicant patch, Hostapd patch
- Aruba
- Debian/Ubuntu
- Mikrotik
- Netgear: WAC120, WAC505/WAC510, WAC720/730, WN604, WNAP210v2, WNAP320, WNDAP350, WNDAP620, WNDAP660, WND930
- Ubiquiti
There are also a number of vendors listed as "Not affected" on the CERT website without further explanation from the vendors themselves. These include:
from HB APK | News,Android,Apps,Games,Technology and more... http://apk.highbroadcast.com/2017/10/these-are-router-makers-that-have.html
0 comments:
Objavi komentar