cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2565
Views
10
Helpful
7
Replies

CSCvf47808 - Key Reinstallation attacks against WPA protocol - 2

Bernhard Kohl
Level 1
Level 1
7 Replies 7

Leo Laohoo
Hall of Fame
Hall of Fame

@Bernhard Kohl wrote:
It is stated that 8.0(150.3) is fixed but the latest version on https://software.cisco.com/download/release.html?mdfid=283791169&flowid=&softwareid=280926605&release=8.0.140.0&relind=AVAILABLE&rellifecycle=ED&reltype=latest ist 8.0.150.0?

Fix for 8.0.X is coming soon.   They are doing final round of testing.  

How long has this been going on?

In my wireless environment we have a mix of 5500/7500 WLCs and we have the following access point models: 1240, 1530, 3500, 3600 and 3700

 

Currently we are running code 8.0.135 because we can not upgrade to a higher version due to the 1242 APs, any suggestions on how to proceed with this?

We are running code 8.0.150 because we can not upgrade to a higher version due to the our 1242 APs, as well.

KRACK.png

Leo Laohoo
Hall of Fame
Hall of Fame
Software fix for the KRACK vulnerability is now available for download. They are 8.0.152.0, 8.2.164.0, 8.3.132.0 and 8.5.105.0.

Leo Laohoo
Hall of Fame
Hall of Fame

@Bernhard Kohl wrote:
It is stated that 8.0(150.3) is fixed but the latest version on https://software.cisco.com/download/release.html?mdfid=283791169&flowid=&softwareid=280926605&release=8.0.140.0&relind=AVAILABLE&rellifecycle=ED&reltype=latest ist 8.0.150.0?

A quick update to anyone reading this thread and intending to upgrade to 8.3.132.0:
Cisco TAC has recommended anyone to HOLD OFF upgrading to 8.3.132.0. TAC has identified a Severity 1 bug which causes the controller to crash after upgrading to 8.3.132.0.
There are no reported issues in regards to other versions.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: