<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Meraki APs and the AirSnitch vulnerability? in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532931#M312459</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Cisco is actively preparing a response to the whitepaper, "AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks." We anticipate sharing our response within the next week.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;At this time, there is no security advisory planned because AirSnitch does not represent a protocol-level vulnerability, such as KRACK or Dragonblood. Additionally, the referenced paper does not introduce new or original findings. This research indicates that the attack leverages fundamental Wi-Fi architectural behaviors that have been part of the standard for a considerable period.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Customers that already adhere to &lt;A href="https://www.cisco.com/site/us/en/solutions/security/zero-trust-access/index.html" target="_self" rel="nofollow noopener noreferrer"&gt;ZTA&lt;/A&gt; principals would not be affected.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Mar 2026 19:45:03 GMT</pubDate>
    <dc:creator>aneduzhk</dc:creator>
    <dc:date>2026-03-03T19:45:03Z</dc:date>
    <item>
      <title>Meraki APs and the AirSnitch vulnerability?</title>
      <link>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532929#M312457</link>
      <description>&lt;P&gt;Are Cisco Meraki Wi-Fi access points vulnerable to the recent AirSnitch vulnerability? Can Meraki's Air Marshal feature help mitigate AirSnitch?&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2026 19:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532929#M312457</guid>
      <dc:creator>Cryptopher</dc:creator>
      <dc:date>2026-03-02T19:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki APs and the AirSnitch vulnerability?</title>
      <link>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532930#M312458</link>
      <description>&lt;P&gt;Hello &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/102638"&gt;@Cryptopher&lt;/A&gt; ,&lt;/P&gt;&lt;P&gt;Thanks for bringing this recently found vulnerability.&lt;/P&gt;&lt;P&gt;As you know, Cisco take security very seriously and as such, our Internal Teams are working on it.&lt;/P&gt;&lt;P&gt;We'll update our community soon.&lt;/P&gt;&lt;P&gt;In the meantime, just keep an eye on &lt;A href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x?product=Cisco&amp;amp;keyword=Meraki&amp;amp;sort=-day_sir#%7EVulnerabilities" target="_blank" rel="noopener nofollow noreferrer"&gt;Cisco Security Advisories&lt;/A&gt; and filter by Meraki product family. This still is one of the best ways to be informed and updated.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2026 22:25:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532930#M312458</guid>
      <dc:creator>Tony-Sydney-AU</dc:creator>
      <dc:date>2026-03-02T22:25:47Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki APs and the AirSnitch vulnerability?</title>
      <link>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532931#M312459</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Cisco is actively preparing a response to the whitepaper, "AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks." We anticipate sharing our response within the next week.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;At this time, there is no security advisory planned because AirSnitch does not represent a protocol-level vulnerability, such as KRACK or Dragonblood. Additionally, the referenced paper does not introduce new or original findings. This research indicates that the attack leverages fundamental Wi-Fi architectural behaviors that have been part of the standard for a considerable period.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Customers that already adhere to &lt;A href="https://www.cisco.com/site/us/en/solutions/security/zero-trust-access/index.html" target="_self" rel="nofollow noopener noreferrer"&gt;ZTA&lt;/A&gt; principals would not be affected.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 19:45:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532931#M312459</guid>
      <dc:creator>aneduzhk</dc:creator>
      <dc:date>2026-03-03T19:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki APs and the AirSnitch vulnerability?</title>
      <link>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532932#M312460</link>
      <description>&lt;P&gt;100% subscribing to this thread.&lt;/P&gt;&lt;P&gt;This is going to land on my desk in a moment I'm pretty sure.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 20:06:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532932#M312460</guid>
      <dc:creator>Raphael_L</dc:creator>
      <dc:date>2026-03-03T20:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki APs and the AirSnitch vulnerability?</title>
      <link>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532933#M312461</link>
      <description>&lt;P&gt;Here is the response - &lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/225587-review-and-recommendations-for.html" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/225587-review-and-recommendations-for.html&lt;/A&gt; It applies for both on-prem and cloud-managed APs. &lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 15:11:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-aps-and-the-airsnitch-vulnerability/m-p/5532933#M312461</guid>
      <dc:creator>aneduzhk</dc:creator>
      <dc:date>2026-03-10T15:11:51Z</dc:date>
    </item>
  </channel>
</rss>

