WPA2 KRACK Exploit: A SonicWall Alert
Exert from here: https://www.sonicwall.com/en-us/support/product-no...
On October 16, 2017 security researchers made public earlier findings in which they demonstrated fundamental design flaws in WPA2 that could theoretically lead to man-in-the-middle (MITM) attacks using key reinstallation attacks (KRACKs). Exploiting the vulnerability could enable cyber criminals to steal confidential information such as email, credit card numbers, passwords and more.
The WPA2 design flaws
are protocol vulnerabilities and are not implementation specific. Both
wireless access points and wireless clients are susceptible. Details of
the vulnerabilities are available on the researchersâ€™ website at
Impact to SonicWall customers
SonicWall Capture Labs has evaluated these vulnerabilities and determined that our SonicPoint and SonicWave wireless access points, as well as our TZ and SOHO Wireless firewalls, are not vulnerable to the flaws in WPA2.
SonicWall is working on a solution to provide an additional layer of protection for SonicWall customers that will block these man-in-the-middle attacks even from vulnerable unpatched clients. This will be delivered in a future SonicOS update.
In order to minimize the potential impact of these vulnerabilities, SonicWall recommends customers take the following actions:
- Patch all Windows, Linux, Android, iOS and Mac OS clients with the latest KRACK updates from client vendors.
additional security, customers can use SonicWall VPN technology to
encrypt all network traffic between their wireless clients and the
- For SSL encryption on mobile devices, use the SonicWall Mobile Connect client, available from the Apple App Store, Google Play, the Windows Phone Store or the Chrome Web Store https://cdn.sonicwall.com/sonicwall.com/media/pdfs/products/product-vpn-clients-mobile-connect.pdf.
- For IPSec encryption, use the SonicWall Global VPN Client https://www.sonicwall.com/en-us/support/knowledge-base/170505725970885.