Skip to content

justbustr/krackinfo

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 

Repository files navigation

Key Reinstallation Attacks (KRACK)

From the KRACK website:

In a key reinstallation attack, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstalls the key, associated parameters such as the incremental transmit packet number (i.e. nonce) and receive packet number (i.e. replay counter) are reset to their initial value. Essentially, to guarantee security, a key should only be installed and used once. Unfortunately, we found this is not guaranteed by the WPA2 protocol. By manipulating cryptographic handshakes, we can abuse this weakness in practice.

Unless a known patch has been applied, assume that all WPA2 enabled Wi-fi devices are vulnerable.

Attacks that can be made (できること)

  • Adversary can decrypt arbitrary packets.
  • Adversary can replay broadcast and multicast frames.
  • Adversary can both decrypt and inject arbitrary packets. (TKIP or GCMP ONLY)
  • Adversary can force the client into using a predictable all-zero encryption key. (ANDROID 6.0+ and LINUX)

Attacks that can not be made (できないこと)

  • Adversary can not recover WPA password.
  • Adversary can not inject packets. (AES-CCMP ONLY)

Vendor Response

Vendor Official Response Comment Last Checked Last Updated Date Notified by CERT
Android No Known Official Response Android 6.0 and above affected (Android uses wpa_supplicant and therefore is affected). 2017-10-16 2017-10-16
Apple No Known Official Response N/A 2017-10-16 2017-10-16
Broadcom No Known Official Response N/A 2017-10-16 2017-10-16
Buffalo / MELCO No Known Official Response N/A 2017-10-16 2017-10-16
Canon No Known Official Response N/A 2017-10-16 2017-10-16
Cisco https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa Multiple Cisco wireless products are affected by these vulnerabilities. 2017-10-16 2017-10-16 28 Aug 2017
CZ.NIC Turris https://forum.turris.cz/t/major-wpa2-vulnerability-to-be-disclosed/5363/8 via @spike411: CZ.NIC Turris team is testing a fix (backported from hostapd upstream):https://gitlab.labs.nic.cz/turris/openwrt/commit/a60970f33f65bfb1d531ce822bfd28ee049a702f 2017-10-16 2017-10-16
D-Link No Known Official Response N/A 2017-10-16 2017-10-16
Debian / Ubuntu http://seclists.org/bugtraq/2017/Oct/25 * Add patches to fix WPA protocol vulnerabilities (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088): - hostapd: Avoid key reinstallation in FT handshake - Prevent reinstallation of an already in-use group key - Extend protection of GTK/IGTK reinstallation of WNM-Sleep Mode cases - Fix PTK rekeying to generate a new ANonce - TDLS: Reject TPK-TK reconfiguration - WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode has not been used - WNM: Ignore WNM-Sleep Mode Response without pending request - FT: Do not allow multiple Reassociation Response frames - TDLS: Ignore incoming TDLS Setup Response retries 2017-10-16 2017-10-16
Espressif Systems No Known Official Response 2017-10-16 2017-10-16 22 Sep 2017
FortiNet http://docs.fortinet.com/uploaded/files/3961/fortiap-v5.6.1-release-notes.pdf FortiAP 5.6.1 is no longer vulnerable to the following CVE Reference:...CVE-2017-13077CVE-2017-13078CVE-2017-13079CVE-2017-13080CVE-2017-13081CVE-2017-13082 2017-10-16 2017-10-16
FreeBSD Project No Known Official Response N/A 2017-10-16 2017-10-16 28 Aug 2017
Google No Known Official Response N/A 2017-10-16 2017-10-16
HPE Aruba http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt N/A 2017-10-16 2017-10-16 28 Aug 2017
Huawei No Known Official Response N/A 2017-10-16 2017-10-16
Intel Corporation No Known Official Response N/A 2017-10-16 2017-10-16 28 Aug 2017
IO DATA No Known Official Response N/A 2017-10-16 2017-10-16
Juniper Networks No Known Official Response N/A 2017-10-16 2017-10-16 28 Aug 2017
Linksys No Known Official Response N/A 2017-10-16 2017-10-16
Linux Patches: https://w1.fi/security/2017-1/ wpa_supplicant version 2.4 and above is affected. Linux's wpa_supplicant v2.6 is also vulnerable to the installation of an all-zero encryption key in the 4-way handshake. 2017-10-16 2017-10-16
MediaTek No Known Official Response N/A 2017-10-16 2017-10-16
Meraki https://documentation.meraki.com/zGeneral_Administration/Support/802.11r_Vulnerability_(CVE%3A_2017-13082)_FAQ Fixed for Cisco Meraki in 24.11 and 25.7 2017-10-16 2017-10-16
Microchip Technology No Known Official Response N/A 2017-10-16 2017-10-16 28 Aug 2017
Microsoft No Known Official Response N/A 2017-10-16 2017-10-16
Mikrotik https://forum.mikrotik.com/viewtopic.php?f=21&t=126695 We released fixed versions last week, so if you upgrade your devices routinely, no further action is required. 2017-10-16 2017-10-16
NEC No Known Official Response N/A 2017-10-16 2017-10-16
Nikon No Known Official Response N/A 2017-10-16 2017-10-16
Nintendo No Known Official Response N/A 2017-10-16 2017-10-16
OpenBSD https://marc.info/?l=openbsd-announce&m=148839684520133&w=2 This problem only affects OpenBSD clients. OpenBSD access points are unaffected. The problem has been fixed in -current. For 5.9 and 6.0 the following errata patches are available. 2017-10-16 2017-10-16
Pakedge No Known Official Response Via @spike411 "They have acknowledged they have received my enquiry but don’t have any info about the state of this vulnerability in their products." 2017-10-16 2017-10-16
Qualcomm Atheros No Known Official Response N/A 2017-10-16 2017-10-16
Red Hat, Inc. No Known Official Response N/A 2017-10-16 2017-10-16 28 Aug 2017
Samsung Mobile No Known Official Response N/A 2017-10-16 2017-10-16 28 Aug 2017
Sharp No Known Official Response N/A 2017-10-16 2017-10-16
Sony No Known Official Response N/A 2017-10-16 2017-10-16
Toshiba Commerce Solutions No Known Official Response N/A 2017-10-16 2017-10-16 15 Sep 2017
Toshiba Electronic Devices & Storage Corporation No Known Official Response N/A 2017-10-16 2017-10-16 28 Aug 2017
Toshiba Memory Corporation No Known Official Response N/A 2017-10-16 2017-10-16 28 Aug 2017
Ubiquiti Networks https://community.ubnt.com/t5/UniFi-Updates-Blog/FIRMWARE-3-9-3-7537-for-UAP-USW-has-been-released/ba-p/2099365 Ubiquiti has released 3.9.3.7537 in beta to mitigate these vulnerabilities. 2017-10-16 2017-10-16
WiFi Alliance https://www.wi-fi.org/security-update-october-2017 Users should refer to their Wi-Fi device vendor’s website or security advisories to determine if their device has been affected and has an update available. As always, Wi-Fi users should ensure they have installed the latest recommended updates from device manufacturers. 2017-10-16 2017-10-16
Yamaha No Known Official Response N/A 2017-10-16 2017-10-16
ZyXEL No Known Official Response N/A 2017-10-16 2017-10-16 28 Aug 2017

About

Information Regarding KRACK

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published