The Key Reinstallation Attacks (KRACK) security vulnerability found in the WPA2 protocol is an extremely hot topic, and it is important that we keep you up-to-date on the status of our firmware fixes and ongoing work on addressing this vulnerability on all fronts.
The majority of Wi-Fi networks use the WPA2 protocol and, as such, we have identified at-risk devices and firmware revisions in our portfolio. Working jointly with our Wi-Fi chipset manufacturers, we have confirmed that this exploit affects Hitron gateways and extenders that support Fast Secure Roaming capabilities found in 802.11r. Fast Secure Roaming improves our users’ Wi-Fi experience as they physically move around the home.
We are actively working to provide you with a firmware patch to address this vulnerability and will also ensure that this fix is made available to all of our customers, even those who do not have the Fast Secure Roaming feature currently activated. This is to safeguard your devices in the event that these capabilities are activated in the future.
It is also important that we make you aware that client devices, laptops/tablets/smartphones, will also need to be patched against KRACK by their respective manufacturers. Client devices will continue to be vulnerable to KRACK, even when the Hitron gateways and extenders are patched.
We appreciate your patience as we work with our Wi-Fi chipset manufacturers to provide you with a fix to this WPA2 security vulnerability. Providing you with an updated firmware in a timely manner to this security vulnerability is our top priority. Your dedicated Hitron Support team will be reaching out in due course with release schedules for the Hitron models associated with your deployments.
Your Dedicated Hitron Team
Comments are closed