Wi-Fi Exploit – TNTMAX Recommendations


UPDATE 10-17-2017 4:05 PM.

As of today, all TNTMAX clients that have our managed wireless services with fully updated Windows 10 are secure against the KRACK vulnerability.

We recommend that our clients go to their wireless appliance vendor’s website and look for a security patch, if available, and roll it out.

Apple iPhone/iPad/Watch and Android device users will need need to wait for patches to their devices.

________________________________________________________________________________

Early on Monday, October 16th, 2017, a security team found a new exploit named KRACK that takes advantages of vulnerabilities in Wi-Fi security that allows attackers to achieve full access to listening to traffic on your wireless network. This traffic was supposed to be encrypted and protected from eavesdropping but this new vulnerability in WAP2 is enabling hackers to bypass it.

Who does it affect? Almost everyone since WAP2 is widely used in every Wi-Fi Router used in homes and businesses.

The US Computer Emergency Readiness Team (US-CERT) issued the following warning:

”CERT Coordination Center (CERT/CC) has released information on Wi-Fi Protected Access II (WPA2) protocol vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system. The vulnerabilities are in the WPA2 protocol, not within individual WPA2 implementations, which means that all WPA2 wireless networking may be affected. Mitigations include installing updates to affected products and hosts as they become available. US-CERT encourages users and administrators to review CERT/CC’s VU #228519.” https://www.kb.cert.org/vuls/id/228519/

 TNTMAX recommends that everyone with a wireless router perform the following:

  • Microsoft has deployed a patched https://www.google.com/amp/s/www.theverge.com/platform/amp/2017/10/16/16481818/wi-fi-attack-response-security-patches#ampshare=https://www.theverge.com/2017/10/16/16481818/wi-fi-attack-response-security-patches
  • Avoid public Wi-Fi at all costs. This includes Google’s protected Wi-Fi hotspots until Google says otherwise. If your carrier forces your phone to Wi-Fi when in range, visit the forum for your phone to see if there’s a workaround to stop it from happening.
  • Only connect to secured services. Web pages that use HTTPS or another secure connection will include HTTPS in the URL. You should contact any company whose services you use and ask if the connection is secured using TLS 1.2, and if so your connection with that service is safe for now.
  • If you have a paid VPN service that you trust you should enable the connection full-time until further notice. Resist the temptation to rush and sign-up for any free VPN service until you can find out if they have been vetted and will keep your data secure. Most don’t.
  • Use a wired network if your router and computer both have a spot to plug in an Ethernet cable. This exploit only affects 802.11 traffic between a Wi-Fi router and a connected device. Ethernet cables are relatively cheap and an eyesore strung across the carpet is worth it. Look for a Cat6 or Cat5e spec cable and there should be no configuration needed once plugged in
  • If you use a Chromebook or MacBookthis USB Ethernet adapter is plug-and-play.
  • Look for your Wifi router manufacturer website for firmware updates that will address the vulnerability.