Print | Rate this content

Notice: HPE MSM7xx Series WLAN Controllers, HPE 5xxx Series Unified WLAN Controllers, HPE 8xx Series Unified WLAN Controllers - WPA2 Key Reinstallation Attacks (aka "Krack Attack")

SUPPORT COMMUNICATION - CUSTOMER NOTICE

Document ID: a00029151en_us

Version: 1

Notice: HPE MSM7xx Series WLAN Controllers, HPE 5xxx Series Unified WLAN Controllers, HPE 8xx Series Unified WLAN Controllers - WPA2 Key Reinstallation Attacks (aka "Krack Attack")
NOTICE: The information in this document, including products and software versions, is current as of the Release Date. This document is subject to change without notice.

Release Date: 2017-10-18

Last Updated: 2017-10-25


DESCRIPTION

On October 16, 2017, security researchers Mathy Vanhoef and Frank Piessens described vulnerabilities in Wi-Fi Protected Access II (WPA2) by publishing a research paper, "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2". Certain Vulnerable WPA2 handshake traffic can be manipulated to induce nonce and session key reuse, resulting in key reinstallation by a wireless access point (AP) or wireless client. This allows for an attacker within range of an affected AP and wireless client to execute arbitrary packet decryption, packet injection, TCP connection hijacking, and HTTP content injection.

This vulnerability has the following CVEs assigned:

CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

For more details, see the "WPA2 Key Reinstallation Vulnerabilities (CVE-2017-13077)" and FAQ on the HPE Aruba web site http://www.arubanetworks.com/support-services/security-bulletins/ Non-HPE site

Addressed Products


HPE MSM7xx Series WLAN Controllers
HPE 5xxx Series Unified WLAN Controllers
HPE 8xx Series Unified WLAN Controllers
HP 10500/7500 Unified Wired-WLAN Module

DETAILS

The HPE MSM and HPE Unified WLAN products are NOT affected by these vulnerabilities:

  • Reinstallation of the pairwise key in the 4-way handshake (CVE-2017-13077)
  • Reinstallation of the group key in the 4-way handshake (CVE-2017-13078)
  • Reinstallation of the integrity group key in the 4-way handshake (CVE-2017-13079)
  • Reinstallation of the group key in the group key handshake (CVE-2017-13080) Reinstallation of the integrity group key in the group key handshake (CVE-2017-13081)

The HPE MSM and HPE Unified WLAN products do not support 802.11r and are not affected by this vulnerability:

  • Accepting a retransmitted FT Reassociation Request (CVE-2017-13082)

The HPE MSM and HPE Unified WLAN products are not affected by these vulnerabilities:

  • Reinstallation of the STK key in the PeerKey handshake (CVE-2017-13084)
  • Reinstallation of the Tunneled Direct-Link Setup PeerKey (CVE-2017-13086)
  • Reinstallation of the Group Key when processing a WNM Sleep Mode Response (CVE-2017-13087)
  • Reinstallation of the Integrity Group Key when processing a WNM Sleep Mode Response (CVE-2017-13088)

HPE is currently performing product impact assessment and will update the http://www.hpe.com/info/security-alerts page as soon as more information is available.




RECEIVE PROACTIVE UPDATES : Receive support alerts (such as Customer Advisories), as well as updates on drivers, software, firmware, and customer replaceable components, proactively via e-mail through HPE Subscriber's Choice. Sign up for Subscriber's Choice at the following URL: Proactive Updates Subscription Form.

NAVIGATION TIP : For hints on navigating HPE.com to locate the latest drivers, patches, and other support software downloads for ProLiant servers and Options, refer to the Navigation Tips document .

SEARCH TIP : For hints on locating similar documents on HPE.com, refer to the Search Tips document


Hardware Platforms Affected: HPE MSM Controller Series
Operating Systems Affected: Not Applicable
Software Affected: Not Applicable
Support Communication Cross Reference ID: SIK2647
©Copyright 2018 Hewlett Packard Enterprise Development LP
Hewlett Packard Enterprise Development shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HPE nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise Development and the names of Hewlett Packard Enterprise Development products referenced herein are trademarks of Hewlett Packard Enterprise Development in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.

Provide feedback

Please rate the information on this page to help us improve our content. Thank you!
Document title: Notice: HPE MSM7xx Series WLAN Controllers, HPE 5xxx Series Unified WLAN Controllers, HPE 8xx Series Unified WLAN Controllers - WPA2 Key Reinstallation Attacks (aka "Krack Attack")
Document ID: emr_na-a00029151en_us-2
How helpful was this document?
How can we improve this document?
Note: Only English language comments can be accepted at this time.
Please wait while we process your request.