[Hotfix release] WPA2 vulnerability (KRACK) of NWA5301-NJ, NWA5123-AC, WAC6103D-I, WAC6500 series
![Zyxel_Kathy](https://us.v-cdn.net/6029482/uploads/avatarstock/nMITT7HQK10NQ.png)
Zyxel_Kathy
Posts: 76
Zyxel Employee
![](https://us.v-cdn.net/6029482/uploads/userpics/FN0BI9T10CTX/n6O940IZ5DEW6.png)
![First Comment](https://us.v-cdn.net/6029482/uploads/badges/MBNFIRD87YVH.png)
![Friend Collector](https://us.v-cdn.net/6029482/uploads/badges/HNJASEUSC535.png)
![First Anniversary](https://us.v-cdn.net/6029482/uploads/badges/SJKCAIG91R5S.png)
This is a hot fix for WPA2 vulnerability, aka KRACK. The following AP are affected when managed by NXC2500/5500 with 802.11r enabled: NWA5301-NJ, NWA5123-AC, WAC6103D-I, WAC6500 series. Note that when the mentioned in standalone mode are not affected because 802.11r is not supported in this mode.
NXC2500 –
5.10(KRACK_hotfix)
NXC5500 – 5.10(KRACK_hotfix)
1
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 153 Nebula Ideas
- 99 Nebula Status and Incidents
- 5.7K Security
- 278 USG FLEX H Series
- 277 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.4K Consumer Product
- 250 Service & License
- 395 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.6K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 75 Security Highlight