<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Key Reinstallation Attacks - breaking WPA2 in Access Points - Indoor and Outdoor</title>
    <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25865#M7059</link>
    <description>The flame is to be expected, If you leave your customers in the dark for hours. When can we expect a statement Ruckus? All other big vendors are there already with a statement and/or fix. At least let us know something of a timeline so we (administrators) can make plans for action.</description>
    <pubDate>Mon, 16 Oct 2017 21:11:00 GMT</pubDate>
    <dc:creator>wietse_van_asse</dc:creator>
    <dc:date>2017-10-16T21:11:00Z</dc:date>
    <item>
      <title>Key Reinstallation Attacks - breaking WPA2</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25860#M7054</link>
      <description>Hello everyone,&lt;BR /&gt;&lt;BR /&gt;I would like to know if Ruckus has already prepared software updates / upgrades for his products due to exposed WPA2 vulnerabilities? Where they plan to release these updates?&lt;BR /&gt;&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077" rel="nofollow" target="_blank" title="Link: https://nvd.nist.gov/vuln/detail/CVE-2017-13077"&gt;CVE-2017-13077&lt;/A&gt;: Reinstallation of the pairwise encryption key (PTK-TK) in the 4-way handshake.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078" rel="nofollow" target="_blank"&gt;CVE-2017-13078&lt;/A&gt;: Reinstallation of the group key (GTK) in the 4-way handshake.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079" rel="nofollow" target="_blank"&gt;CVE-2017-13079&lt;/A&gt;: Reinstallation of the integrity group key (IGTK) in the 4-way handshake.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080" rel="nofollow" target="_blank"&gt;CVE-2017-13080&lt;/A&gt;: Reinstallation of the group key (GTK) in the group key handshake.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081" rel="nofollow" target="_blank"&gt;CVE-2017-13081&lt;/A&gt;: Reinstallation of the integrity group key (IGTK) in the group key handshake.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082" rel="nofollow" target="_blank"&gt;CVE-2017-13082&lt;/A&gt;:
 Accepting a retransmitted Fast BSS Transition (FT) Reassociation 
Request and reinstalling the pairwise encryption key (PTK-TK) while 
processing it.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13084" rel="nofollow" target="_blank"&gt;CVE-2017-13084&lt;/A&gt;: Reinstallation of the STK key in the PeerKey handshake.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086" rel="nofollow" target="_blank"&gt;CVE-2017-13086&lt;/A&gt;: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087" rel="nofollow" target="_blank"&gt;CVE-2017-13087&lt;/A&gt;: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088" rel="nofollow" target="_blank"&gt;CVE-2017-13088&lt;/A&gt;:
 reinstallation of the integrity group key (IGTK) when processing a 
Wireless Network Management (WNM) Sleep Mode Response  frame.&lt;/LI&gt;&lt;/UL&gt;Source: &lt;A href="https://www.krackattacks.com/" rel="nofollow" target="_blank"&gt;https://www.krackattacks.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dawid</description>
      <pubDate>Mon, 16 Oct 2017 14:20:50 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25860#M7054</guid>
      <dc:creator>dawid_krawczak</dc:creator>
      <dc:date>2017-10-16T14:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Key Reinstallation Attacks - breaking WPA2</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25861#M7055</link>
      <description>I just closed a chat support session with the expectation of an update to be provided during the second half of today.</description>
      <pubDate>Mon, 16 Oct 2017 14:25:49 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25861#M7055</guid>
      <dc:creator>jesse_johnston_</dc:creator>
      <dc:date>2017-10-16T14:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: Key Reinstallation Attacks - breaking WPA2</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25862#M7056</link>
      <description>See the other thread "&lt;A href="https://forums.ruckuswireless.com/ruckuswireless/topics/severe-flaw-in-wpa2-cracked" rel="nofollow" target="_blank" title="Link https//forumsruckuswirelesscom/ruckuswireless/topics/severe-flaw-in-wpa2-cracked"&gt;https://forums.ruckuswireless.com/ruckuswireless/topics/severe-flaw-in-wpa2-cracked&lt;/A&gt;"</description>
      <pubDate>Mon, 16 Oct 2017 14:35:21 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25862#M7056</guid>
      <dc:creator>ruben_herold</dc:creator>
      <dc:date>2017-10-16T14:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: Key Reinstallation Attacks - breaking WPA2</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25863#M7057</link>
      <description>I have just found this thread. This one should be closed then.</description>
      <pubDate>Mon, 16 Oct 2017 14:38:03 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25863#M7057</guid>
      <dc:creator>dawid_krawczak</dc:creator>
      <dc:date>2017-10-16T14:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: Key Reinstallation Attacks - breaking WPA2</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25864#M7058</link>
      <description>Hello, let's all use the above thread instead of new posts please, and Ruckus is preparing a format Security update for this issue.&lt;BR /&gt;I'm about to say something on that discussion, thank you.&amp;nbsp;&amp;nbsp;&amp;nbsp; - Michael</description>
      <pubDate>Mon, 16 Oct 2017 20:31:36 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25864#M7058</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2017-10-16T20:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: Key Reinstallation Attacks - breaking WPA2</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25865#M7059</link>
      <description>The flame is to be expected, If you leave your customers in the dark for hours. When can we expect a statement Ruckus? All other big vendors are there already with a statement and/or fix. At least let us know something of a timeline so we (administrators) can make plans for action.</description>
      <pubDate>Mon, 16 Oct 2017 21:11:00 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25865#M7059</guid>
      <dc:creator>wietse_van_asse</dc:creator>
      <dc:date>2017-10-16T21:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Key Reinstallation Attacks - breaking WPA2</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25866#M7060</link>
      <description>Yes Wietse, I'm the Forum moderator... who learned of this issue today.</description>
      <pubDate>Mon, 16 Oct 2017 21:17:05 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Key-Reinstallation-Attacks-breaking-WPA2/m-p/25866#M7060</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2017-10-16T21:17:05Z</dc:date>
    </item>
  </channel>
</rss>

