Wi-Fi Protected Access II (WPA2) handshake traffic can be manipulated to induce nonce and session key reuse

As news broke yesterday, there has been discovered a serious weaknesses in WPA2, a protocol that secures all protected Wi-Fi networks. An attacker with rogue accesspoint within the wireless communications range of an affected client or AP acting as client (repeater or 802.11r) may leverage these vulnerabilities to gain access to encryption keys and decrypt the traffic.

Microsoft says Windows updates released on October 10th address this issue and protects customers. Updates fixing this issue for Linux,  Android and OS X are reported to go public in coming weeks

Solutions

  • Follow vendors releases and apply updates when those arrive.
  • Use of AES-CCMP encryption protocol.
  • Disable 802.11r (fast roaming) if used.
  • Use of an encryption above transition layer such as SSL/TLS, SSH and VPN solutions.
     

Reference

https://www.kb.cert.org/vuls/id/228519/