"Monday morning was not a great time to be an IT admin, with the public release of a bug that effectively broke WPA2 wireless security.
- WPA2 security flaw puts almost every Wi-Fi device at risk of hijack, eavesdropping
- Security experts have said the bug is a total breakdown of the WPA2 security protocol.
As reported previously by ZDNet, the bug, dubbed "KRACK" -- which stands for Key Reinstallation Attack -- is at heart a fundamental flaw in the way Wi-Fi Protected Access II (WPA2) operates.
...The vulnerability does not mean the world of WPA2 has come crumbling down, but it is up to vendors to mitigate the issues this may cause.
In total, ten CVE numbers have been preserved to describe the vulnerability and its impact, and according to the US Department of Homeland Security (DHS), the main affected vendors are Aruba, Cisco, Espressif Systems, Fortinet, the FreeBSD Project, HostAP, Intel, Juniper Networks, Microchip Technology, Red Hat, Samsung, various units of Toshiba and Ubiquiti Networks..."
Read on!
No comments:
Post a Comment