schwasskin
New Around Here
Does anyone know if the latest firmware has been patched for the recent WPA2 vulns?
Sent from my Moto G (4) using Tapatalk
Sent from my Moto G (4) using Tapatalk
Pls. continue reading here: WPA2 Vulnerability ExposedDoes anyone know if the latest firmware has been patched for the recent WPA2 vulns?
So basically, you should rather be asking Motorola when they will patch your phone, as it's the one that's vulnerable.
So basically, you should rather be asking Motorola when they will patch your phone, as it's the one that's vulnerable.
... Finally, although an unpatched client can still connect to a patched AP, and vice versa, both the client and AP must be patched to defend against all attacks!
not worried about my phone. easy enough to disable wifi all together. But I will be patching my clients. thanksSo basically, you should rather be asking Motorola when they will patch your phone, as it's the one that's vulnerable.
Even so, still good practice to release a patch as it's still vulnerable, listed here: http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4
Even Ddwrt, lede have patched their firmwares, shouldn't it be considered really? Server or client both should be parched regardless.. If not guess I'll have to switch to ddwrt.
Broadcom will release patch to us soon, and we will release new firmware ASAP.
For Broadcom models only STA/repeater mode is impacted. AP mode is not after all.
Most of Broadcom uses are not affected.
According to the researcher Mathy Vanhoef a patch on both the client and the AP is necessary to fix the issue.
Source, the FAQ on the website he has published for his research: https://www.krackattacks.com/#faq under 'Do we now need WPA3?'
What if there are no security updates for my router?
Our main attack is against the 4-way handshake, and does not exploit access points, but instead targets clients. So it might be that your router does not require security updates. We strongly advise you to contact your vendor for more details. In general though, you can try to mitigate attacks against routers and access points by disabling client functionality (which is for example used in repeater modes) and disabling 802.11r (fast roaming). For ordinary home users, your priority should be updating clients such as laptops and smartphones.
Please see the numerous other threads on the matter.
In summary, if you are using it as just a router (AP) it’s not a problem the router can fix. If you are using it as a media bridge/extender (Client) then Asus need to fix it, not @RMerlin
Sent from my iPhone using Tapatalk
I am using my RT-AC68U (Asus-Merlin firmware) as a wifi Access Point attached to a switch which gets DHCP from my pfSense router (PC based). Should I be concerned? Which part needs to be fixed? Asus-Merlin or pfSense?
Thanks.Access Point is not vulnerable.
So is it accurate that converting my authentication method from WPA2-Personal to WPA2-Enterprise would protect against the exploit on my home network? Or is that not correct?
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!