KRACK Key Re-installation Attack - WPA2 Attack
KRACK (Keyless Re-installation Attack) is a vulnerability in WPA2 (Wireless Protected Access 2) that could allow an attacker to eavesdrop on Wi-Fi traffic, reading encrypted network traffic, and in some cases, sending traffic back to the network
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
KRACK (Keyless Re-installation Attack) is a vulnerability in WPA2 (Wireless Protected Access 2) that could allow an attacker to eavesdrop on Wi-Fi traffic, reading encrypted network traffic, and in some cases, sending traffic back to the network
Threat details
Millions of Wi-Fi enabled devices are at risk including Windows, Apple, Linux, Android and more.
There are several key management vulnerabilities in the four-way handshake of the WPA2 security protocol. The impact of exploiting these vulnerabilities include, but are not limited to, packet decryption, packet replay, TCP connection hijacking and HTTP content injection.
To exploit this vulnerability, an attacker would have to be physically close to the target device. The attacker cannot derive the WPA2 encryption key (or password) and hence cannot connect malicious devices directly to the Wi-Fi network. There is no need to change Wi-Fi passwords or other enterprise credentials in response to the KRACK vulnerability.
Note that as a protocol-level issue, this will likely affect all correct implementations of the standard including WPA2 Personal (as commonly seen on home networks and in small businesses) and WPA2 Enterprise profiles.
CVE identifier CVE-2017-13080 has been assigned to the KRACK vulnerability.
Update
A number of BD (Benton, Dickinson and Company) Pyxis medical products are vulnerable to KRACK key re-installation attacks. An attacker may use this attack to gain access to sensitive medical data.
For a full list of affected products further information please see the BD Security Bulletin and ICS-CERT Advisory ICSMA-18-114-01.
Update
The researchers who originally discovered KRACK have released a new paper detailing several new exploitation methods. They claim they are now able to perform KRACK-based attacks on the 802.11v standard and the Fast Initial Link Setup (FILS) and Tunneled direct-link setup PeerKey (TPK) handshake used in mobile environments.
Several proof-of-concept exploits have also been released by the researchers, who say that they are able to bypass current patches.
For further information:
Threat updates
| Date | Update |
|---|---|
| 1 May 2018 |
A number of BD (Benton, Dickinson and Company) Pyxis medical products are vulnerable to KRACK key re-installation attacks. An attacker may use this attack to gain access to sensitive medical data. For a full list of affected products further information please see the BD Security Bulletin and ICS-CERT Advisory ICSMA-18-114-01. |
Remediation steps
| Type | Step |
|---|---|
|
CVE Vulnerabilities
Last edited: 17 February 2020 11:33 am