We have some SSID's broadcast using WPA2 authentication and have "Fast Transition" configured.
Recently KRACK Attack vulnerability is released. does this security vulnerability have patch already?
Solved! Go to Solution.
Cisco will be releasing a fix very soon.
Remember that this vulnerability affects not just the APs but any wireless client with a wireless NIC. So patching the APs won't fix the issue as the wireless client(s) needs to be patched as well.
See here for more information: https://supportforums.cisco.com/t5/security-and-network-management/severe-flaw-in-wpa2-protocol-krack-attack/td-p/3199201
If you have a WLAN with FT(802.11r) enabled, please follow the work around provided in this Cisco security advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa#workarounds, Please subscribe to notifications of this document for the latest news and fixes.
Disabling FT (802.11r) on the AP/WLC side is an effective workaround to the AP side vulnerability, and the client-side vulnerabilities will need to be addressed on the client side.
A quick update to anyone reading this thread and intending to upgrade to 184.108.40.206:
Cisco TAC has recommended anyone to HOLD OFF upgrading to 220.127.116.11. TAC has identified a Severity 1 bug which causes the controller to crash after upgrading to 18.104.22.168.
There are no reported issues in regards to other versions.