Security Warning WiFi WPA2 protocol susceptible to multiple vulnerabilities

Security Warning WiFi WPA2 protocol susceptible to multiple vulnerabilities

Reference: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088
Version: 1.1


Aruba, Cisco, Espressif Systems, Fortinet, Inc., FreeBSD Project, Google, HostAP, Intel Corporation, Juniper Networks, Microchip Technology, Microsoft Corporation, OpenBSD, Peplink, Red Hat Inc., Samsung Mobile, Sierra Wireless, Toshiba Commerce Solutions, Toshiba Electronic Devices & Storage Corporation, Toshiba Memory Corporation, Ubiquiti Networks, Ubuntu, Watchguard Technologies, Inc, ZyXEL.



Encryption bypass through Man-in-the-Middle "key reinstallation attacks".



If your device connects to a wireless WPA2 access point you can no longer be certain of a secure connection. Because this is a protocol-level issue, most protected Wi-Fi networks, including personal and enterprise WPA2 networks, are affected and vulnerable to some or all of the mentioned man-to-the-middle attacks. These result in for instance decryption, packet replay, content injection and TCP connection hijacking.


Several key management vulnerabilities in the WPA2 security protocol were discovered allowing key reinstallation attacks. This can be exploited only if combined with a Man-in-the-Middle attack to break the encryption used for WPA2 connections.

Recommended Action

All wireless enabled devices, corporate or at home, will require a security update to be applied. If available, patch rigorously, our colleagues at CERT Carnegie Mellon University maintain a table with Vendor Information:
Using WPA2-PSK with AES-CCMP in combination with TLS, HTTPS or through a VPN all together remains the safest wireless solution.