<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kr00k wireless vulnerability in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501684#M301628</link>
    <description>&lt;P&gt;A quick summary:&lt;/P&gt;&lt;P&gt;WPA2 security can be bypassed on some devices.&lt;/P&gt;&lt;P&gt;For the MX64W and MX65W you need 15.28 to no longer be vulnerable.&lt;/P&gt;&lt;P&gt;For the MR26, MR32, MR34 and MR72 you need 26.8, which is due to be available in May.&lt;/P&gt;&lt;P&gt;Boy, am I glad we are in lockdown, we have ~30 affected devices and our corporate SSID currently uses WPA2!&lt;/P&gt;</description>
    <pubDate>Tue, 28 Apr 2020 07:56:47 GMT</pubDate>
    <dc:creator>CMR</dc:creator>
    <dc:date>2020-04-28T07:56:47Z</dc:date>
    <item>
      <title>Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501673#M301617</link>
      <description>&lt;P&gt;Cisco has identified 14 wireless devices so far that are vulnerable to the new Kr00k vulnerability (&lt;A href="https://www.bleepingcomputer.com/news/security/kr00k-bug-in-broadcom-cypress-wifi-chips-leaks-sensitive-info/" target="_blank" rel="noopener nofollow noreferrer"&gt;CVE-2019-15126&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/cisco-working-on-patches-for-new-kr00k-wifi-vulnerability/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.bleepingcomputer.com/news/security/cisco-working-on-patches-for-new-kr00k-wifi-vulnerability/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;No mention of any Meraki wireless equipment yet.&lt;/P&gt;&lt;P&gt;Has anybody heard differently yet?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 19:01:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501673#M301617</guid>
      <dc:creator>jgbright</dc:creator>
      <dc:date>2020-02-27T19:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501674#M301618</link>
      <description>&lt;P&gt;I have not heard any reports of Meraki APs being affected but will double check.  All of the recent and current APs do not use Broadcom or Cypress chipsets and are not vulnerable, but some of the older End-of-Sale APs had Broadcom, that's what I'll check on and get back to you.  &lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 19:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501674#M301618</guid>
      <dc:creator>daviscot</dc:creator>
      <dc:date>2020-02-27T19:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501675#M301619</link>
      <description>&lt;P&gt;And here's the link to the Cisco announcement:&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure" target="_blank" rel="nofollow noopener noreferrer"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 19:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501675#M301619</guid>
      <dc:creator>jgbright</dc:creator>
      <dc:date>2020-02-27T19:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501676#M301620</link>
      <description>&lt;P&gt;This is being accessed by our Security Team. Updates to follow.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 19:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501676#M301620</guid>
      <dc:creator>aneduzhk</dc:creator>
      <dc:date>2020-02-27T19:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501677#M301621</link>
      <description>I was going to say, Meraki uses Qualcomm so they should not be affected</description>
      <pubDate>Thu, 27 Feb 2020 19:16:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501677#M301621</guid>
      <dc:creator>Nolan H.</dc:creator>
      <dc:date>2020-02-27T19:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501678#M301622</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Meraki is aware of the CVE-2019-15126 vulnerability (also commonly known as Kr00k). At this time, Meraki is evaluating the impact and the affected products (if any). We will provide updates as we make progress to ensure the security of our products.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 21:30:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501678#M301622</guid>
      <dc:creator>aneduzhk</dc:creator>
      <dc:date>2020-03-02T21:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501679#M301623</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Update:&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;None of our orderable 802.11ac Wave 2 (MR20, MR33, MR30H, MR42, MR52, MR53, MR42E, MR53E, MR70, MR74, MR84) or 802.11ax (WiFi-6) Access Points (MR45, MR55, MR36, MR46, MR56) are susceptible to this vulnerability. &lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Older APs not listed above may be affected, and more updates on those SKUs will be provided soon.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 16:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501679#M301623</guid>
      <dc:creator>aneduzhk</dc:creator>
      <dc:date>2020-03-06T16:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501680#M301624</link>
      <description>Thank you for the update &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/14171"&gt;@aneduzhk&lt;/A&gt;</description>
      <pubDate>Fri, 06 Mar 2020 17:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501680#M301624</guid>
      <dc:creator>Nolan H.</dc:creator>
      <dc:date>2020-03-06T17:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501681#M301625</link>
      <description>Any further updates on other SKUs, &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/14171"&gt;@aneduzhk&lt;/A&gt;? Is there an official source for information on this issue?</description>
      <pubDate>Mon, 16 Mar 2020 15:11:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501681#M301625</guid>
      <dc:creator>JoshBarfield</dc:creator>
      <dc:date>2020-03-16T15:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501682#M301626</link>
      <description>&lt;P&gt;Still in progress. We are &lt;SPAN&gt;in uncharted territory right now with the global coronavirus pandemic, so we should expect responses to/from other teams that are involved to be delayed. I hope you understand. Thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2020 21:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501682#M301626</guid>
      <dc:creator>aneduzhk</dc:creator>
      <dc:date>2020-03-20T21:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501683#M301627</link>
      <description>&lt;P&gt;&lt;A title="https://meraki.cisco.com/blog/cisco-meraki-customer-advisories/" href="https://meraki.cisco.com/blog/cisco-meraki-customer-advisories/" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;SPAN&gt;Cisco Meraki Customer Advisories&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;page has been updated with the relevant information.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 23:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501683#M301627</guid>
      <dc:creator>aneduzhk</dc:creator>
      <dc:date>2020-04-23T23:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501684#M301628</link>
      <description>&lt;P&gt;A quick summary:&lt;/P&gt;&lt;P&gt;WPA2 security can be bypassed on some devices.&lt;/P&gt;&lt;P&gt;For the MX64W and MX65W you need 15.28 to no longer be vulnerable.&lt;/P&gt;&lt;P&gt;For the MR26, MR32, MR34 and MR72 you need 26.8, which is due to be available in May.&lt;/P&gt;&lt;P&gt;Boy, am I glad we are in lockdown, we have ~30 affected devices and our corporate SSID currently uses WPA2!&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 07:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501684#M301628</guid>
      <dc:creator>CMR</dc:creator>
      <dc:date>2020-04-28T07:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501685#M301629</link>
      <description>&lt;P&gt;Yes, you right,&lt;/P&gt;&lt;P&gt;I also didn't face any &lt;SPAN&gt;vulnerability in our environment. And didn't get any update from Meraki side.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 21:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501685#M301629</guid>
      <dc:creator>Prateek Maheshwari</dc:creator>
      <dc:date>2020-04-28T21:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501686#M301630</link>
      <description>&lt;P&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/1133"&gt;@jgbright&lt;/A&gt; just wanted to come back and close the loop on this one regarding kr00k (CVE ID: CVE-2019-15126, CVSSv3 Base Score: 3.1) that hit back in late February.  Meraki MR26, MR32, MR34 and MR72 and MX64W, MX65W use the impacted chips and are affected by this vulnerability.&lt;/P&gt;&lt;P&gt;More info here.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/zGeneral_Administration/Privacy_and_Security/FullMAC_Wi-Fi_chipsets_vulnerability_(kr00k)" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/zGeneral_Administration/Privacy_and_Security/FullMAC_Wi-Fi_chipsets_vulnerability_(kr00k)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and &lt;/P&gt;&lt;P&gt;&lt;A href="https://meraki.cisco.com/blog/cisco-meraki-customer-advisories/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://meraki.cisco.com/blog/cisco-meraki-customer-advisories/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 20:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501686#M301630</guid>
      <dc:creator>daviscot</dc:creator>
      <dc:date>2020-05-05T20:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501687#M301631</link>
      <description>&lt;P&gt;Version 26.8 now available to upgrade. &lt;/P&gt;&lt;P&gt;Looks like it's also the initial stable firmware for some unreleased access points too ... unless I've missed a webinar.&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 08:11:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501687#M301631</guid>
      <dc:creator>anythinghosted</dc:creator>
      <dc:date>2020-05-06T08:11:55Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501688#M301632</link>
      <description>&lt;P&gt;This is correct. &lt;SPAN&gt;Initial stable firmware for MR46E/MR76/MR86 upcoming APs &lt;SPAN class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 16:11:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501688#M301632</guid>
      <dc:creator>aneduzhk</dc:creator>
      <dc:date>2020-05-06T16:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501689#M301633</link>
      <description>&lt;P&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/1133"&gt;@jgbright&lt;/A&gt; this thread should be good to close, I believe?&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 16:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501689#M301633</guid>
      <dc:creator>aneduzhk</dc:creator>
      <dc:date>2020-05-06T16:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: Kr00k wireless vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501690#M301634</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/14171"&gt;@aneduzhk&lt;/A&gt; wrote:&lt;BR /&gt;
&lt;P&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/1133"&gt;@jgbright&lt;/A&gt; this thread should be good to close, I believe?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I'm going to go ahead and mark &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/2298"&gt;@daviscot&lt;/A&gt;'s response as the solution for better visibility when people happen upon this thread. &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/1133"&gt;@jgbright&lt;/A&gt; do let us know if you need any further info though!&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 16:34:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/kr00k-wireless-vulnerability/m-p/5501690#M301634</guid>
      <dc:creator>CarolineS-Meraki</dc:creator>
      <dc:date>2020-05-06T16:34:25Z</dc:date>
    </item>
  </channel>
</rss>

