New KRACK Attack Breaks WPA2 WiFi Protocol

New KRACK Attack Breaks WPA2 WiFi Protocol

By | October 16th, 2017
No Comments on New KRACK Attack Breaks WPA2 WiFi Protocol

Mathy Vanhoef, a researcher from the University of Leuven (KU Leuven), has

discovered a severe flaw in the Wi-Fi Protected Access II (WPA2) protocol

that secures all modern protected Wi-Fi networks.


KRACK allows an attacker to carry out a MitM and force network participants to reinstall the encryption key used to protected WPA2 traffic. The attack also doesn’t recover WiFi passwords.The attack works only if the attacker is in the victim’s WiFi network range, and is not something that could be carried out via the Internet.

HTTPS may also protect user traffic in some cases, as HTTPS uses its own separate encryption layer. Nonetheless, HTTPS is not 100% secure, as attacks exist that could downgrade the connection and grant the attacker access to HTTPS encrypted traffic [123456].The KRACK attack is universal and works against all type of devices connecting or using a WPA2 WiFi network. This includes Android, Linux, iOS, macOS, Windows, OpenBSD, and embedded and IoT devices.

Because the vulnerability in establishing the WPA2 handshake affects the protocol itself, even devices with a perfect protocol implementation are affected.Changing WiFi passwords doesn’t protect users. Users must install firmware updates for affected products.


Nisheeth Bhakuni