http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10075Fixes -->
http://forums.dlink.com/index.php?topic=72763.msg292201On October 16th, researchers disclosed security vulnerabilities in the widely used standard for Wi-Fi security WPA2 (Wi-Fi Protected Access II) that make it possible for attackers to eavesdrop on Wi-Fi traffic. D-Link has immediately taken actions to investigate this matter. This security concern appears to be an industry-wide issue that will require firmware patches to be provided from the relevant semiconductor chipset manufacturers.
D-Link has requested assistance from the chipset manufacturers. As soon as the firmware patches are received from the chipset manufacturers, we will post them on our websites immediately. Please take the following important actions to help protect your privacy:
1. Is highly recommended to use encrypted communications protocols such as VPN or HTTPS, especially when delivering confidential information.
2. Check our website regularly for the newest firmware updates.
For a hacker to use this exploit, the two following conditions must happen:
1. Hacker has to be within your Wi-Fi signal.
2. When a wireless client is connecting to or disconnecting from your wireless network (e.g. a camera reboot).
Associated CVE IDs for CERT/CC VU number:
VU#228519CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
The WPA2 protocol is ubiquitous in wireless networking. The vulnerabilities described are in the standard requiring a broad product-line and industry correction. Users are encouraged to install updates to affected products and hosts as they are available. For information about a specific product, check the table in the link below. Note that the table list is not exhaustive, and we recommend to check back frequently over the next 30 days.
List of D-Link products at risk and time table of fixes -->
http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10075Status for all vendors at risk (Industry-wide) -
https://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4