A statement from SonicWall:
WPA2 KRACK Exploit: A SonicWall Alert
On October 16, 2017 security researchers made public earlier findings in which they demonstrated fundamental design flaws in WPA2 that could theoretically lead to man-in-the-middle (MITM) attacks using key reinstallation attacks (KRACKs). Exploiting the vulnerability could enable cyber criminals to steal confidential information such as email, credit card numbers, passwords and more.
The WPA2 design flaws are protocol vulnerabilities and are not implementation specific. Both wireless access points and wireless clients are susceptible. Details of the vulnerabilities are available on the researchers’ website at www.krackattacks.com.
Impact to SonicWall Customers
SonicWall Capture Labs has evaluated these vulnerabilities and determined that our SonicPoint and SonicWave wireless access points, as well as our TZ and SOHO Wireless firewalls, are not vulnerable to the flaws in WPA2.
SonicWall is working on a solution to provide an additional layer of protection for SonicWall customers that will block these man-in-the-middle attacks even from vulnerable unpatched clients. This will be delivered in a future SonicOS update.
In order to minimize the potential impact of these vulnerabilities, SonicWall recommends customers take the following actions:
- Patch all Windows, Linux, Android, iOS and Mac OS clients with the latest KRACK updates from client vendors.
- For additional security, customers can use SonicWall VPN technology to encrypt all network traffic between their wireless clients and the SonicWall firewall.
- For SSL encryption on mobile devices, use the SonicWall Mobile Connect client, available from the Apple App Store, Google Play, the Windows Phone Store or the Chrome Web Store https://cdn.sonicwall.com/sonicwall.com/media/pdfs/products/product-vpn-clients-mobile-connect.pdf.
- For IPSec encryption, use the SonicWall Global VPN Client https://www.sonicwall.com/en-us/support/knowledge-base/170505725970885.
Should you have further questions or need assistance, please contact your preferred SonicWall reseller or SonicWall Support. You can also expect to see a blog post about this vulnerability on https://blog.sonicwall.com/ shortly.