Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping

Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping

6 years ago
Anonymous $ZOEEBQ1zf0

https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/

An air of unease set into the security circles on Sunday as they prepared for the disclosure of high-severe vulnerabilities in the Wi-Fi Protected Access II protocol that make it possible for attackers to eavesdrop Wi-Fi traffic passing between computers and access points.

The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research has been a closely guarded secret for weeks ahead of a coordinated disclosure that's scheduled for 8 a.m. Monday. An advisory the US CERT recently distributed to about 100 organizations described the research this way:

Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping

Oct 16, 2017, 5:13am UTC
https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/ >An air of unease set into the security circles on Sunday as they prepared for the disclosure of high-severe vulnerabilities in the Wi-Fi Protected Access II protocol that make it possible for attackers to eavesdrop Wi-Fi traffic passing between computers and access points. >The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research has been a closely guarded secret for weeks ahead of a coordinated disclosure that's scheduled for 8 a.m. Monday. An advisory the US CERT recently distributed to about 100 organizations described the research this way: