cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2240
Views
5
Helpful
8
Replies

CSCvg10793%20-%20Key%20Reinstallation%20attacks%20against%20WPA%20protocol%20-%201

aghm
Level 1
Level 1

Hi,

 

Couple of weeks ago we have Installed some new AP2800i is our organization network and we did upgrade WLC 5508 software from 8.2.151  to  8.3.122 in which Cisco recommended.

 

Do I need to upgrade software again???

Please find information about new WAPs 2802i installed in attachment. If you need more information please don't hesitate to contact me.

 

I look forward to hearing from you soon.

 

Regards,

Daniel

1 Accepted Solution

Accepted Solutions

Leo Laohoo
Hall of Fame
Hall of Fame

@aghm wrote:

Do I need to upgrade software again???

 


Hi Daniel, 

This vulnerability affects anything with a wireless NIC.  It's not just wireless AP but also wireless clients as well.  Patching the client will fix 9 out of 10 vulnerabilities but not CVE-2017-13082.

 

Perspective About the Recent WPA Vulnerabilities (KRACK Attacks)

 

There is no "workaround" for this vulnerability.  Upgrade is the only way.  It is your call to make the decision to upgrade or not.  

View solution in original post

8 Replies 8

Leo Laohoo
Hall of Fame
Hall of Fame

@aghm wrote:

Do I need to upgrade software again???

 


Hi Daniel, 

This vulnerability affects anything with a wireless NIC.  It's not just wireless AP but also wireless clients as well.  Patching the client will fix 9 out of 10 vulnerabilities but not CVE-2017-13082.

 

Perspective About the Recent WPA Vulnerabilities (KRACK Attacks)

 

There is no "workaround" for this vulnerability.  Upgrade is the only way.  It is your call to make the decision to upgrade or not.  

Daniel,

 

The short answer is yes. 

Leo Laohoo
Hall of Fame
Hall of Fame

KRACK.png

Leo Laohoo
Hall of Fame
Hall of Fame

KRACK.png

 

 

Latest update in BUD ID: CSCvf47808 and CSCvg10793, does not show 8.3.122.0 in affected release list. So wondering if 8.3.122.0 is affected.

 

Affected Releases
Support for FT was added in 7.2, all releases after that are affected if FT is enabled
Releases 7.0 and lower are not affected
8.5.103.0
8.4 all releases
8.3.100.0 to 8.3.121.0 for all AP types
8.3.130.0 Partially, fixed for IOS, affected for AP-COS
8.2 up to 8.2.160.0
8.1 all releases
8.0 up to 8.0.150.0
7.2 to 7.6 all releases

Resolved Releases
8.3.131.0 and higher
8.3.130.6 (escalation)
(additional releases will be included here as they are made available)

 

 

8.3 is affected by CSCvf47808.  

8.3.131.0 was released about 16 hours ago.  In the Release Notes, under Resolved Caveats, CSCvf47808 is listed.  

Please see updated post below.

Kindly delay with doing any upgrade to 8.3.130.0.  During their testing phase (after the release) they found some issues affecting non-Wave 2 APs.  They've found what the issue is and they're testing the new fix before releasing the fix version on 23 October 2017.  

I have updated my earlier post of the ETA of the fix to reflect the new development.  

Leo Laohoo
Hall of Fame
Hall of Fame
Software fix for the KRACK vulnerability is now available for download. They are 8.0.152.0, 8.2.164.0, 8.3.132.0 and 8.5.105.0.
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: