If you are using Wi-Fi at your business or home, please read carefully.
Last Monday, we learned about KRACK (Key Reinstallation AttaCK), a serious weakness in wireless security due to a flaw in the WPA2 protocol. In simple terms, WPA2 is a security protocol used by most wireless devices to communicate with one another. Meaning, routers, laptops, cellphones, printers and other wireless devices can be vulnerable and allow private data to be stolen.
The first thing you should do is not panic. While this vulnerability could allow an attacker to eavesdrop on or modify data being transmitted over wireless connections, at the same time, this attack is not going to be easy to pull off and a working exploit has not been published as of yet.
Catalin Cimpanu – Bleeping Computer
The best method to protect your systems is by updating all of your wireless devices. Please keep in mind, some manufacturers are faster than others to release these updates. So, if you do not see an update, try again tomorrow or check this list. For example, Microsoft released a security patch on October 10, 2017, as part of Update Tuesday to resolve this vulnerability in all affected editions of Windows (E.g. Windows 7, Windows 8, Windows 8.1 and Windows 10). In the other hand, Apple and Google are still working on the final touches to release an update for their devices.
TCSP is currently scheduling and preparing updates for clients with an active support agreement. Meaning, no action is required from the client’s end unless otherwise noted. However, please update personal devices, such as cellphones, tablets and home routers that are not covered by the agreement. If you need assistance with this task, please feel free to contact us.
SonicWall Capture Labs has evaluated these vulnerabilities and determined that our SonicPoint and SonicWave wireless access points, as well as our TZ and SOHO Wireless firewalls, are not vulnerable to the flaws in WPA2.
SonicWall is working on a solution to provide an additional layer of protection for SonicWall customers that will block these man-in-the-middle attacks even from vulnerable unpatched clients. This will be delivered in a future SonicOS update.
More information regarding this matter is available at the following links: