KRACK - Key Reinstallation Attack - what equipment was affected?

2884

KRACK!... You have no idea what I'm talking about? If what comes to mind is dust or small white rocks then let me direct you to the right path.

KRACK was the diminutive given to a security protocol attack WPA (Wi-Fi Protected Access)Both WPA1 as WPA2. The vulnerability found enables you to decrypt Wi-Fi traffic without password knowledge, including when you use "secure" encryption protocols such as WPA2 (personal or enterprise).

Which brands and models of equipment are affected?

An important detail is that the vulnerability is in the protocol itself and not in the specific implementation of one or another manufacturer. This means that manufacturers who have followed the rules of the proper protocol, as required by law, are very likely to have been affected.

An analogy

For an analogy, imagine that Wi-Fi is the safe transport by any vehicle. A failure to produce a particular make or model, Ferrari F60 America for example, would impact only those who bought that model. The solution would be to change cars ... relatively simple.

But let us imagine that the principle on which we are based to produce the combustion engines was wrong at first. In this case, all cars with engines made based on this principle would be affected. This is what is happening with KRACK and WPA1 / 2.

Okay, but what do I do?

If you use Wi-Fi on your network and especially if you use it for sensitive traffic, updates made available by manufacturers for any and all Wi-Fi equipment (access points and customers)

Security vulnerabilities are usually cataloged with a code CVE Common Vulnerabilities and Exposures. This vulnerability was associated with 10 CVE codes:

  • CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the four-way handshake.
  • CVE-2017-13078: Reinstallation of the GTK group in the four-way handshake.
  • CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the four-way handshake.
  • CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake.
  • CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake.
  • CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it.
  • CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake.
  • CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake.
  • CVE-2017-13087: reinstallation of the group key (GTK) while processing the Wireless Network Management (WNM) Sleep Mode Response frame.
  • CVE-2017-13088: reinstallation of the integrity group key (IGTK) while processing the Wireless Network Management (WNM) Sleep Mode Response frame.

For specific information, search by the name of your manufacturer or model of equipment associated with CVE-2017-13077. Still to evaluate your equipment, it is available a list affected by the vulnerability.

Cisco!

Cisco has a public page where it publishes "Advisories " of security (also known as PSIRT) affecting their products. For this particular vulnerability the Advisory is already published and should be the single point of reference for up-to-date information on whether or not your equipment is affected and what actions to take to reduce exposure.

Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II

Cisco KRACK

O Cisco security blog is also an important resource.

If you have equipment from another manufacturer investigate and subscribe to equivalent lists.

Article originally published in Mario Pinho's Blog , re-published in MenosFios with permission of the author.


Sources:

KRACK Attacks: Official page
https://www.krackattacks.com/

KRACK Demo: Critical Key Reinstallation Attack Against Widely-Used WPA2 Wi-Fi Protocol
https://thehackernews.com/2017/10/wpa2-krack-wifi-hacking.html?m=1

Vendor Information for VU # 228519
http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4

What You Should Know About the 'KRACK' WiFi Security Weakness
https://krebsonsecurity.com/2017/10/what-you-should-know-about-the-krack-wifi-security-weakness/

Perspective About the Recent WPA Vulnerabilities (KRACK Attacks)
https://blogs.cisco.com/security/wpa-vulns

Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa

LEAVE AN ANSWER

Please enter your comment!
Please enter your name here