is AccessPoint nwa1123-ac affected by KRACK and will receive a firmware update?
"KRACK (short for Key Reinstallation AttaCK) targets the third step in a four-way authentication “handshake” performed when Wi-Fi client devices attempt to connect to a protected Wi-Fi network. The encryption key can be resent multiple times during step three, and if attackers collect and replay those retransmissions in particular ways, Wi-Fi security encryption can be broken."
This affects all WPA2 implementations. Microsoft already provided a patch. All device manufacturers have already been informed the latest since 28 August 2017.
Refer to https://www.krackattacks.com/
I am aware of http://www.zyxel.com/support/announcement_wpa2_key_management.shtml but I am not sure whether this applies for my product as well.
Anyway the last Firmware update for the nwa1123-ac dates from September 2016´so I am looking forward to at least yearly updates...
I noticed the announcement for nwa1120 for Feb 2018. http://www.zyxel.com/support/announcement_wpa2_key_management.shtml I hope this also applies for nwa1123-ac?0
I found the announcement http://www.zyxel.com/support/announcement_wpa2_key_management.shtml I hope this also applies for my product?0
Currently NWA1123-AC series means NWA1123-AC Pro and NWA1123-AC V2 which are current selling products on the market.
These 2 models are not affected by these vulnerabilities.
We have updated the latest post "Zyxel security advisory for the key management vulnerabilities of WPA2 protocol"
Please refer to "https://businessforum.zyxel.com/discussion/642/zyxel-security-advisory-for-the-key-management-vulnerabilities-of-wpa2-protocol#latest "
If you are referring to NWA1123-AC, this was an EOL (End of Life) product and no plan to have further software maintenance.
Also, we suggest not using client mode on NWA1123-AC to be free from these vulnerabilities.0
Uhm, excuse me??
NWA1123-AC most certainly is affected by this vulnerability as it is part of "NWA1120 series", which is listed on the announcement.0
Thanks for your kindly reminder,
we already updated our feedback and statement.0
@ Zyxel Kelly:
the problem that I do have now, is the following: two NWA1123ac APs were purchased in feb. 2016 having a two years warranty. As a matter of fact these APs now became security wise INOPERATIVE because of a missing hotfix.
So what are my options now?
Either is Zyxel willing to do an AP exchange of my newly defective APs (NWA1123 ACv2 vs. my NWA1123AC) or is able to bring out the hotfix that was originally announced two weeks ago.
The latter will definitely help a mojority of other users though.
And yes, I do have an understanding for cutting support for EOL devices, as long as these models have no valid warranty (which is not the case with the NWA1123ac!) anymore.
@B_B,Thanks for your feedback,as discussion on another topic,https://homeforum.zyxel.com/discussion/426/zyxel-security-advisory-for-the-key-management-vulnerabilities-of-wpa2-protocolwe checked with Biz WLAN team,we will provide hotfix for NWA1123-AC v1.If you have other questions of WLAN product, you can post on Zyxel Biz WLAN Forum as below:Thank you for using Zyxel.0
Zyxel_Kelly, thanks for your info update on that!
Meanwhile business support pointed out the same link/info to me as well.
So NO KRACK Attack victim as long as not configured as a WiFi client.
- 8.5K All Categories
- 1.6K Nebula
- 71 Nebula Ideas
- 57 Nebula Status and Incidents
- 4.5K Security
- 226 Security Ideas
- 983 Switch
- 46 Switch Ideas
- 874 WirelessLAN
- 22 WLAN Ideas
- 5.1K Consumer Product
- 157 Service & License
- 280 News and Release
- 98 Success Stories
- 59 Security Advisories
- 13 Education Center
- 580 FAQ
- 263 Nebula FAQ
- 160 Security FAQ
- 76 Switch FAQ
- 74 WirelessLAN FAQ
- 7 Consumer Product FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 69 About Community
- 46 Security Highlight