WPA 2 – Wi-Fi Protected Access II, a popular security protocol which is mostly used by every router on the globe is found vulnerable. Researchers claim to have found high-severity vulnerabilities in WPA2.
The exploit is called KRACK, short for Key Reinstallation Attacks, and it works by affecting the four-way handshake used to establish a key for traffic encryption. The attack happens at the third step of the process when a key can be resent multiple times and when resent in a certain way, a cryptographic nonce can be reused so that the whole security operation is compromised.
More details will be revealed at 8am EST (5:30pm IST) on Monday, with the CVEs about the vulnerabilities set to be published at the time, alongside other details on a dedicated site called krackattacks.com, named after the proof-of-concept attack called KRACK (Key Reinstallation Attacks).
An advisory distributed by the US CERT (Computer Emergency Readiness Team), and obtained by Ars Technica, highlights the issue that will be revealed on Monday
US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.