ausarb
October 16, 2017, 5:27am
1
Any ETA an/or guidance for peplink devices on the newly reported KRACK vulnerability?
Have you read the message that @Keith recently submitted regarding this? They’re “on it.”
1 Like
rcole
October 16, 2017, 7:34am
3
Who is Keith? Where can we find his post?
Hi. You may find it helpful to do a topic/ keyword search before posting, although we have all certainly missed relevant postings! Here’s the message to which I referred:
On October 16th, 2017, an industry wide vulnerability (VU#228519) in WPA/WPA2, codenamed KRACK, was made public. We have evaluated our products and online services to assess the impact of this vulnerability.
Affected Features:
Wi-Fi AP functionality is NOT affected by this vulnerability.
Wi-Fi WAN (also known as Wi-Fi as WAN or Wi-Fi client) functionality is affected.
Affected Models:
In general, our products which support “Wi-Fi WAN” functionality is affected, including:
MAX: 700, OTG, B…
1 Like
Thank you for reposting it because the self-evident search for “KRACK” on usarb’s part would not have returned the original posting, which cited only the VU number. Kudos also to Keith for the prompt and precise response.
1 Like
Keith
October 16, 2017, 2:03pm
6
Our advisory is updated with the keyword KRACK.
On October 16th, 2017, an industry wide vulnerability (VU#228519) in WPA/WPA2, codenamed KRACK, was made public. We have evaluated our products and online services to assess the impact of this vulnerability.
Affected Features:
Wi-Fi AP functionality is NOT affected by this vulnerability.
Wi-Fi WAN (also known as Wi-Fi as WAN or Wi-Fi client) functionality is affected.
Affected Models:
In general, our products which support “Wi-Fi WAN” functionality is affected, including:
MAX: 700, OTG, B…
Thanks for the appreciation. The credits go to our entire team.
2 Likes