- May 7, 2002
- 10,371
- 762
- 126
Think of all of those devices that will NOT get patched up. 
**edit, Just a FYI, but *clients* should be patched pronto. That means, all your phones, IoT devices, and whatever else is a client.
If you are using a router as a router (and are NOT using WPA2/TKIP, WPA2/GCMP, or 802.11r), this is NOT a time critical thing, the clients must be patched though, that is how they can intercept things.
**edit, Just a FYI, but *clients* should be patched pronto. That means, all your phones, IoT devices, and whatever else is a client.
If you are using a router as a router (and are NOT using WPA2/TKIP, WPA2/GCMP, or 802.11r), this is NOT a time critical thing, the clients must be patched though, that is how they can intercept things.
https://www.bleepingcomputer.com/ne...-driver-updates-for-krack-wpa2-vulnerability/As many people have read or will soon read, there is a vulnerability in the WPA2 wireless protocol called Krack that could allow attackers to eavesdrop on wireless connections and inject data into the wireless stream in order to install malware or modify web pages.
To protect yourself, many WiFi product vendors will be releasing updated firmware and drivers for their products. It is strongly suggested that users update their hardware as soon as a update is available in order to protect themselves. This includes router firmware and wireless network card drivers.
To help with this, I have created a list of known information regarding various WiFi vendors and whether new drivers are available. As this vulnerability is fairly new, there is little information available, I advise you to check this page throughout the coming days to see if new information is available. This page includes information resulting from contacting of vendors, CERT's informative page, and other sources.
Last edited: