Advisory for the key management vulnerabilities of WPA2 protocol

Oct 23, 2017
Advisory for the key management vulnerabilities of WPA2 protocol
We are aware of the recently found key management vulnerabilities in the 4-way handshake and group key handshake of the Wi-Fi Protected Access II (WPA2) security protocol and 802.11r Fast-BSS Transition (FT). Most of wireless clients and repeaters are affected. Please be advised that a Key Reinstallation Attack (KRACK) is mostly a local based attack, and hence attackers will need to be within range of a wireless network.

Billion’s router devices are not affected by this KRACK.

Please be informed that other devices connecting to Billion products and acting as wireless clients (e.g. laptops, smartphones, and tablets etc.) or wireless repeater could be vulnerable. Please contact your devices manufacturers, if necessary, for available updates.
 
Best regards
Billion Team
back
Share by: