Zyxel security advisory for the key management vulnerabilities of WPA2 protocol.
Zyxel is aware of the recently found key management vulnerabilities of the WiFi Protected Access II (WPA2) security protocol, as identified in US-CERT vulnerability note VU#228519, with vulnerable IDs CVE-2017-13077 through CVE-2017-13082.
What are the vulnerabilities?
These vulnerabilities affect wireless products that connect to WiFi networks in different ways, depending on the role of products as WiFi clients or servers, as described in table 1 below.
Table 1
Type of attack | CVE IDs | Devices impacted |
---|---|---|
4-way handshake | CVE-2017-13077 | WiFi clients |
Group-key handshake | CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 |
WiFi clients |
802.11r Fast-BSS Transition (FT) | CVE-2017-13082 | Access points |
It is important to note that an attacker has to be physically nearby and is within the wireless range to exploit these weaknesses.
Please see: https://www.krackattacks.com/#details for more technical information.
How are Zyxel resolving the vulnerabilities?
At Zyxel we treat security as a top priority and we have conducted a thorough investigation and identified a list of products vulnerable to the issue(s), as shown in table 2 below. For products not listed, they are not affected to the attacks either because they are not designed to act as WiFi clients or do not support 802.11r Fast-BSS Transition handshake by default.
We are now co-working with WiFi chipset vendors to create a solution, and the patch firmware will be available in the next few weeks or even sooner, provided WiFi chipset vendors will release their patches much earlier.
Please refer to table 2 for the detailed release schedule.
Table 2
CVE ID | Series/Model | Hotfix availability | Standard Availability |
---|---|---|---|
CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 |
NWA1100-NH | 31-Dec 2017 | Feb 2018 or sooner |
WAP6405 | N/A | 1-Nov 2017 or sooner | |
WAP6804 | N/A | 6-Nov 2017 or sooner | |
WAP6806 | N/A | Feb 2018 or sooner | |
WRE2206 | N/A | Feb 2018 or sooner | |
WRE6505 v2 | N/A | Jan 2018 or sooner | |
WRE6606 | N/A | Feb 2018 or sooner | |
Cam3115 | N/A | Feb 2018 or sooner | |
CVE-2017-13082 | NWA5301-NJ | 16-Nov 2017 | Feb 2018 or sooner |
NWA5123-AC | 16-Nov 2017 | Feb 2018 or sooner | |
WAC6103D-I | 16-Nov 2017 | Feb 2018 or sooner | |
WAC6500 series | 16-Nov 2017 | Feb 2018 or sooner |
What should I do now to protect myself against the vulnerabilities?
As mentioned previously – It is important to note that an attacker has to be physically nearby and is within the wireless range to exploit these weaknesses. As our Business class Access Points support the 802.11r Fast-BSS Transition (FT) handshake, devices supporting this feature are listed in the vulnerability list (table 2). By default, the 802.11r is not enabled in Zyxel Products or Controllers; and the majority of Zyxel customers will not be affected.
For customers who have enabled 802.11r, who are concerned about the security risks, they should disable the 802.11r feature to prevent an attack from taking place. Once the Hotfix has been released, clients wishing to use the 802.11r feature are advised to update as soon as possible to ensure the vulnerability does not affect the security of their network.
Bron: ZyXel support