Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse

https://www.krackattacks.com/

Interesting... I just read a little bit about this too. I doubt that ePMP products that are being used in TDD/ePTP modes would be vulnerable as there's no way for a regular wifi device to connect and initiate the handshake needed to break the encryption. ePMP in WiFi mode and all the cnPilot gear will need to be updated.

Hi,

Here is the official thread on the topic:

http://community.cambiumnetworks.com/t5/Enterprise-e4XX-e5XX-series/Security-Advisory-on-Key-Reinstallation-Attacks-KRACK/td-p/79118

Thanks,

Dmitry 

Dmitry - that link is broken, and I cannot find a thread in the Enterprise-e4XX-e5XX-series subforum referring to this subject...

j

J, 

How about this one:

http://community.cambiumnetworks.com/t5/ePMP-2000-and-1000/Security-Advisory-on-Key-Reinstallation-Attacks-KRACK/m-p/79135#M12008

or this:

http://community.cambiumnetworks.com/t5/Enterprise-e4XX-e5XX-series/Security-Advisory-on-Key-Reinstallation-Attacks-KRACK/m-p/79130#M2313

Its also a sticky at the top of the "ePMP 2000 and 1000" and "Enterprise (e4XX, e5XX series)forum pages. 

Thanks,

Sriram

2 Likes