D-Link Forums

Announcements => Security Advisories => Topic started by: GreenBay42 on October 17, 2017, 07:34:09 AM

Title: D-Link Response to KRACK
Post by: GreenBay42 on October 17, 2017, 07:34:09 AM
http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10075 (http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10075)

Fixes --> http://forums.dlink.com/index.php?topic=72763.msg292201 (http://forums.dlink.com/index.php?topic=72763.msg292201)

On October 16th, researchers disclosed security vulnerabilities in the widely used standard for Wi-Fi security WPA2 (Wi-Fi Protected Access II) that make it possible for attackers to eavesdrop on Wi-Fi traffic. D-Link has immediately taken actions to investigate this matter. This security concern appears to be an industry-wide issue that will require firmware patches to be provided from the relevant semiconductor chipset manufacturers.
D-Link has requested assistance from the chipset manufacturers. As soon as the firmware patches are received from the chipset manufacturers, we will post them on our websites immediately. Please take the following important actions to help protect your privacy:
1. Is highly recommended to use encrypted communications protocols such as VPN or HTTPS, especially when delivering confidential information.
2. Check our website regularly for the newest firmware updates.
For a hacker to use this exploit, the two following conditions must happen:
1. Hacker has to be within your Wi-Fi signal.
2. When a wireless client is connecting to or disconnecting from your wireless network (e.g. a camera reboot).
Associated CVE IDs for CERT/CC VU number: VU#228519 (http://www.kb.cert.org/vuls/id/228519)

The WPA2 protocol is ubiquitous in wireless networking. The vulnerabilities described are in the standard requiring a broad product-line and industry correction. Users are encouraged to install updates to affected products and hosts as they are available. For information about a specific product, check the table in the link below. Note that the table list is not exhaustive, and we recommend to check back frequently over the next 30 days.

List of D-Link products at risk and time table of fixes --> http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10075 (http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10075)

Status for all vendors at risk (Industry-wide) - https://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4 (https://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4)
Title: Re: D-Link Response to KRACK
Post by: FurryNutz on October 17, 2017, 09:22:31 AM
http://forums.dlink.com/index.php?topic=56542.0 (http://forums.dlink.com/index.php?topic=56542.0)
Title: Re: D-Link Response to KRACK
Post by: GreenBay42 on October 17, 2017, 09:51:22 AM
Make sure you update your clients - Windows/Mac, iOS and Android. This hack is not accessible through the Internet. A hacker will have to be within your Wi-Fi network to gain access. Make sure you are careful when accessing public Wi-Fi networks (coffee shops, hotels, airport, etc). It is recommended to use your 3g/4g on your smartphone/tablets on public networks until Android, iOS, and Windows have released patches (read the CNET article below).

What to do -->https://www.tomsguide.com/us/wifi-krack-attack-what-to-do,news-25990.html (https://www.tomsguide.com/us/wifi-krack-attack-what-to-do,news-25990.html)

Industry responses --> https://www.cnet.com/news/krack-wi-fi-attack-patch-how-microsoft-apple-google-responding/ (https://www.cnet.com/news/krack-wi-fi-attack-patch-how-microsoft-apple-google-responding/)