| Rate this content |
Notice: HPE MSM7xx Series WLAN Controllers, HPE 5xxx Series Unified WLAN Controllers, HPE 8xx Series Unified WLAN Controllers - WPA2 Key Reinstallation Attacks (aka "Krack Attack")SUPPORT COMMUNICATION -
CUSTOMER NOTICE
Document ID: a00029151en_us Version: 1 Notice: HPE MSM7xx Series WLAN Controllers, HPE 5xxx Series Unified WLAN Controllers, HPE 8xx Series Unified WLAN Controllers - WPA2 Key Reinstallation Attacks (aka "Krack Attack")
NOTICE: The information in this document, including products and software versions, is current as of the Release Date. This document is subject to change without notice.
Release Date: 2017-10-18 Last Updated: 2017-10-25 DESCRIPTIONOn October 16, 2017, security researchers Mathy Vanhoef and Frank Piessens described vulnerabilities in Wi-Fi Protected Access II (WPA2) by publishing a research paper, "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2". Certain Vulnerable WPA2 handshake traffic can be manipulated to induce nonce and session key reuse, resulting in key reinstallation by a wireless access point (AP) or wireless client. This allows for an attacker within range of an affected AP and wireless client to execute arbitrary packet decryption, packet injection, TCP connection hijacking, and HTTP content injection. This vulnerability has the following CVEs assigned: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088 For more details, see the "WPA2 Key Reinstallation Vulnerabilities (CVE-2017-13077)" and FAQ on the HPE Aruba web site
http://www.arubanetworks.com/support-services/security-bulletins/ Addressed Products
DETAILSThe HPE MSM and HPE Unified WLAN products are NOT affected by these vulnerabilities:
The HPE MSM and HPE Unified WLAN products do not support 802.11r and are not affected by this vulnerability:
The HPE MSM and HPE Unified WLAN products are not affected by these vulnerabilities:
HPE is currently performing product impact assessment and will update the http://www.hpe.com/info/security-alerts page as soon as more information is available. RECEIVE PROACTIVE UPDATES : Receive support alerts (such as Customer Advisories), as well as updates on drivers, software, firmware, and customer replaceable components, proactively via e-mail through HPE Subscriber's Choice. Sign up for Subscriber's Choice at the following URL: Proactive Updates Subscription Form. NAVIGATION TIP : For hints on navigating HPE.com to locate the latest drivers, patches, and other support software downloads for ProLiant servers and Options, refer to the Navigation Tips document . SEARCH TIP : For hints on locating similar documents on HPE.com, refer to the Search Tips document
Hardware Platforms Affected: HPE MSM Controller Series
Software Affected: Not Applicable
Support Communication Cross Reference ID: SIK2647
©Copyright 2018 Hewlett Packard Enterprise Development LP
Hewlett Packard Enterprise Development shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HPE nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise Development and the names of Hewlett Packard Enterprise Development products referenced herein are trademarks of Hewlett Packard Enterprise Development in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
|
Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.
Provide feedback |
Please rate the information on this page to help us improve our content. Thank you! |
- Was the information on this page helpful?
- Very helpful
- Somewhat helpful
- Not helpful