Welcome to TP-LINK Tech Support Forum
+ Reply to Thread
Page 1 of 8 1 2 3 ... LastLast
Results 1 to 15 of 120
  1. #1
    Administrator tplink has disabled reputation
    Join Date
    Mar 2012
    Posts
    443

    [Security Flaws] Severe flaws called "KRACK" are discovered in the WPA2 protocol

    Dear All,

    On October 16th, 2017, an security researcher has disclosed some severe flaws in the WPA2 security protocol.

    Description of the vulnerability
    The vulnerability that known as "KRACK", short for Key Reinstallation Attack, will target the four-way handshake of the WPA2 protocol. Mathy Vanhoef, who published the flaw, said that the flaw may allow an attacker within the Wi-Fi range to decrypt network traffic from a WPA2-enabled device, hijack connections, and inject content into the traffic stream.
    The publisher also points out that, the main attack is against the 4-way handshake, and does not exploit access points, but instead targets clients. So it might be that your router does not require security updates.
    For more details, please refer to the below article published by Vanhoef:
    https://www.krackattacks.com/

    The following Common Vulnerabilities and Exposures (CVE) identifiers were assigned to track which products are affected by specific instantiations of the key reinstallation attack:CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

    TP-Link is aware of the vulnerabilities (KRACKs) in the WPA-2 protocol. We have published a security advisory on the official website and are working to solve the problems now.
    Security Advisory:
    http://www.tp-link.com/en/faq-1970.html
    Software updates for the affected devices will be post at http://www.tp-link.com/support.html over the next few weeks.
    Your network security is highly regarded by TP-Link.


    Clarification for the WPA2 Vulnerabilities:
    1. Please have a look at the article published by Mathy Vanhoef and pay attention to the QA listed at the end:
    Q: What if there are no security updates for my router?
    A: Our main attack is against the 4-way handshake, and does not exploit access points, but instead targets clients. So it might be that your router does not require security updates. We strongly advise you to contact your vendor for more details. In general though, you can try to mitigate attacks against routers and access points by disabling client functionality (which is for example used in repeater modes) and disabling 802.11r (fast roaming). For ordinary home users, your priority should be updating clients such as laptops and smartphones.


    From the QA, we can get clear that the vulnerabilities only targets the devices act as Wi-Fi clients, including laptops, smartphones, range extenders working in RE mode, routers/gateways working in RE/WDS/WISP mode.
    Thus if you're using the following TP-Link products:
    (Unaffected Devices)
    # All powerline adapters
    # All mobile Wi-Fi products
    # Routers and gateways working on default Router mode or Access Point mode
    # Range extenders working in AP mode
    You will not be affected by the WPA2 vulnerabilities. What you need to do is updating your Wi-Fi clients.

    2. Conditions under which devices are vulnerable:
    # Physical proximity: An attack can only happen when an attacker is in physical proximity to and within wireless range of your network.
    # Time window: An attack can only happen when a client is connecting or reconnecting to a Wi-Fi network.


    Devices affected by the vulnerability
    Routers working in Repeater Mode/WISP Mode/Client Mode:

    TL-WR940N with firmware version 3.17.1 Build 170717 Rel.55495n or earlier (Hardware Version 3.0 or earlier not affected)

    TL-WR841Nv13 with firmware version 0.9.1 4.16 v0348.0 Build 170814 Rel.59214n or earlier (Hardware Version 12.0 or earlier not affected)
    TL-WR840N with firmware version 0.9.1 4.16 v019a.0 Build 170524 Rel.56478n or earlier (Hardware Version 2.0 or earlier not affected)
    TL-WR941HP with firmware version 3.16.9 Build 20170116 Rel.50912n or earlier
    TL-WR841HP with firmware version 3.16.9 Build 160612 Rel.67073n or earlier
    TL-WR902AC with firmware version 3.16.9 Build 20160905 Rel.61455n or earlier
    TL-WR802N with firmware version 0.9.1 3.16 v0188.0 Build 170705 Rel.34179n or earlier
    TL-WR810N with firmware version 3.16.9 Build 160801 Rel.57365n or earlier
    Routers with WDS function enabled (disabled by default) may be affected. Refer to the FAQ to learn how to check if WDS is enabled on your router.

    Range Extenders working in Repeater Mode during a WPA2 handshake that is initiated only when connecting or reconnecting to a router:
    TL-WA850RE with firmware version 1.0.0 Build 20170609 Rel.34153 or earlier
    TL-WA855RE with firmware version 1.0.0 Build 20170609 Rel.36187 or earlier
    TL-WA860RE with firmware version 1.0.0 Build 20170609 Rel.38491 or earlier
    RE200 with firmware version 1.1.3 Build 20170818 Rel.58183 or earlier
    RE210 with firmware version 3.14.2 Build 160623 Rel.43391n or earlier
    RE305 with firmware version 1.0.0 Build 20170614 Rel.42952 or earlier
    RE450 with firmware version 1.0.2 Build 20170626 Rel.60833 or earlier
    RE500 with firmware version 1.0.1 Build20170210 Rel.59671 or earlier
    RE650 with firmware version 1.0.2 Build 20170524 Rel.58598 or earlier

    Wireless Adapters:
    Archer T6E
    Archer T9E

    Whole Home Wi-Fi System:
    Deco M5 with firmware version 1.1.5 Build 20170820 Rel.62483 or earlier

    CPE/WBS/CAP:
    CAP300 with firmware version 1.1.0 Build 20170601 Rel.60253 or earlier
    CAP300-Outdoor with firmware version 1.1.0 Build 20170601 Rel.60212 or earlier
    CAP1750 with firmware version 1.1.0 Build 20170601 Rel.60196 or earlier
    CAP1200 with firmware version 1.0.0 Build 20170801 Rel.61314 or earlier
    TL-ER604W with firmware version 1.2.0 Build 20160825 Rel.45880 or earlier
    CPE520 with firmware version 2.1.6 Build 20170908 Rel.45234 or earlier
    CPE610 with firmware version 2.1.5 Build 20170830 Rel. 58245 or earlier
    CPE510 with firmware version 2.1.6 Build 20170908 Rel. 45233 or earlier
    CPE220 with firmware version 2.1.6 Build 20170908 Rel. 45233 or earlier
    CPE210 with firmware version 2.1.6 Build 20170908 Rel. 45234 or earlier
    WBS210 with firmware version 2.1.0 Build 20170609 Rel. 57434 or earlier
    WBS510 with firmware version 2.1.6 Build 20170908 Rel. 45234 or earlier

    Smart home devices:
    Smart Plugs and Switch: HS100,HS105,HS110,HS200
    Smart Repeater with Plugs: RE350K,RE270K,RE370K
    Cameras: NC250,NC260,NC450, KC120

    How to protect your devices
    Until a software update is available to eliminate the vulnerability for your product, it is recommended to take the following precautions:
    For wireless routers: Make sure your routers are in Router Mode or AP Mode, and patch the operating system of your smartphones, tablets and computers.
    For wireless adapters: Patch the operating system of your computers.
    Microsoft security update: Microsoft has fixed such security issues as mentioned in https://portal.msrc.microsoft.com/en...CVE-2017-13080

    TP-Link has been working on affected models and will release firmware over the next few weeks on our official website.

    Reversion History
    2017-10-17: Initial release
    2017-10-18: Updated some clarifications for the WPA2 vulnerabilities
    2017-10-18: Updated the list of affected devices

  2. #2
    Junior Member himenohogosha is on a distinguished road
    Join Date
    Oct 2017
    Posts
    1
    It would be great if you could update your status on this database regarding acknowledgement and fix of the vulnerability : http://www.kb.cert.org/vuls/id/JLAD-AS7PN2

  3. #3

    Question Mailinglist available

    Hello tplink,

    will there be a Mailing list available which informs that there are fixes requered/available?

    greeting
    Herman™

  4. #4
    Administrator tplink has disabled reputation
    Join Date
    Mar 2012
    Posts
    443
    Quote Originally Posted by Herman.TM View Post
    Hello tplink,

    will there be a Mailing list available which informs that there are fixes requered/available?

    greeting
    Herman™
    We will list the affected models after a confirmation and the beta releases should be available in the coming weeks.

  5. #5
    I hope that will apply to end-of-life products as well, such as my TD-W9980 (Ver 1.0).

  6. #6
    Quote Originally Posted by tplink View Post
    We will list the affected models after a confirmation and the beta releases should be available in the coming weeks.
    Weeks for a beta? Given other companies are already releasing production patches, isn't that a bit slow?

  7. #7
    Junior Member osandu is on a distinguished road
    Join Date
    Oct 2017
    Posts
    1
    As per https://www.krackattacks.com, it seems that you knew about this vulnerability from some time (see below), so how long do you need to investigate if your products are affected by the vulnerabilities? It's mid October by now..



    Quote from https://www.krackattacks.com
    [h=3]When did you first notify vendors about the vulnerability?[/h]We sent out notifications to vendors whose products we tested ourselves around 14 July 2017. After communicating with these vendors, we realized how widespread the weaknesses we discovered are (only then did I truly convince myself it was indeed a protocol weaknesses and not a set of implementation bugs). At that point, we decided to let CERT/CC help with the disclosure of the vulnerabilities. In turn, CERT/CC sent out a broad notification to vendors on 28 August 2017.

  8. #8
    Junior Member bimbam2103 is on a distinguished road
    Join Date
    Oct 2017
    Posts
    1

    Exclamation Security Risk Archer C2 (V 1.0)

    Hello everybody.

    I can confirm that the TP-Link Archer C2 (V 1.0) has this Problem. I tested it minutes ago.

    My Problem is, that i use this Router for my server. Deactivating WLAN is not possible because i have also WLAN-Clients like Tablets they do not have a sim-slot.

    Is it possible to close this security risk very fast and publish a firmware update because my entire company works with this server included the websites.

    Greetings

    bimbam2103

  9. #9
    Junior Member ANPEX is on a distinguished road
    Join Date
    Oct 2017
    Posts
    1
    I have two TP LINK: TL-WDR4300 and TL-WA901ND routers.

    I am awaiting the corrections by the manufacturers.

    And there's always the possibility of using a DD-WRT firmware.

    Whichever comes first.

  10. #10
    Junior Member Data-Hound is on a distinguished road
    Join Date
    Oct 2017
    Posts
    1
    Quote Originally Posted by tplink View Post
    We will list the affected models after a confirmation and the beta releases should be available in the coming weeks.
    As a security professional this response is not acceptable. Address and fix these security flaws immediately.

  11. #11
    Junior Member mh1983 is on a distinguished road
    Join Date
    Oct 2017
    Posts
    1

    Include W8961ND

    I agree with the previous poster about EOL products. Please include the W8961ND (v2)

  12. #12
    OK, so where do we check for this list of affected models and fixes if needed?
    http://www.tp-link.com/us/support/faqs ???



  13. #13
    Quote Originally Posted by tplink View Post
    TP-Link is aware of the flaws (KRACK) in the WPA2 protocol. We are now investigating if our products are affected by the vulnerabilities. Once verified, will release an announcement on the official website about the affected products, and offer software fixes for them.
    Thanks for looking into whether the KRACK vulnerability has compromised your range extenders, tplink. I use a Netgear R6250 AC router and a TP-Link AC750 Range Extender. Netgear has stated that their range extenders have been compromised by a vulnerability that appears to be the KRACK vulnerability. I've included a link to a security advisory Netgear published yesterday that addresses this issue if you'd like to review it:

    https://kb.netgear.com/000049498/Sec...-PSV-2017-2837

    I have no way of knowing if TP-Link employs the same or similar WPA2 technology in your range extenders as Netgear uses in theirs. But if you do, it may be safe to assume that your range extenders have been compromised by the KRACK vulnerability as well.

    I look forward to receiving your updates.

  14. #14
    You must have built a landing page which people could check their router is ok or not.

  15. #15
    Junior Member Pierre13 is on a distinguished road
    Join Date
    Oct 2017
    Posts
    1
    Common guys... this flaw is known since months !!! ( 5 months ).
    And you didn't have the time to check your products ?


 

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

Copyright © 1996-2017 TP-LINK Technologies Co., Ltd. All rights reserved.