10-17-2017 11:03 PM - edited 03-20-2019 09:38 PM
I have received notification from Security about below Cisco WPA2 vulnerability and many of cisco Access-Point are affected due to this vulnerability but they have suggested software upgradation on Cisco WLC
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
currently i have 3600 and 3700 AP and 8.0.140 software version running on WLC.
In above link they have not given that 8.0.140 os affected due WPA2 vulnerability ,
So Do i need to add software patch on my WLC. Please suggest.
Many thanks in Advance.
Regards,
Pavan Pawar
Solved! Go to Solution.
10-17-2017 11:28 PM
@pavan.pawar wrote:
am still confused here because they have not mentioned that 8.0.x version is affected.
Do i need to upgrade WLC ?
8.0.X.X is vulnerable otherwise Cisco wouldn't divert resources to publish a fix.
This vulnerability affects anything with a wireless NIC. It's not just wireless AP but also wireless clients as well. Patching the client will fix 9 out of 10 vulnerabilities but not CVE-2017-13082.
Perspective About the Recent WPA Vulnerabilities (KRACK Attacks)
10-17-2017 11:16 PM - edited 10-20-2017 04:15 PM
APs are running firmware which are vulnerable. Above is the official date of release of the fixes.
10-17-2017 11:25 PM
am still confused here because they have not mentioned that 8.0.x version is affected.
Do i need to upgrade WLC ?
10-17-2017 11:28 PM
@pavan.pawar wrote:
am still confused here because they have not mentioned that 8.0.x version is affected.
Do i need to upgrade WLC ?
8.0.X.X is vulnerable otherwise Cisco wouldn't divert resources to publish a fix.
This vulnerability affects anything with a wireless NIC. It's not just wireless AP but also wireless clients as well. Patching the client will fix 9 out of 10 vulnerabilities but not CVE-2017-13082.
Perspective About the Recent WPA Vulnerabilities (KRACK Attacks)
10-17-2017 11:28 PM
12-08-2017 05:28 AM
What are the options, please, for customers using Mobility Express on a 1852i for instance, and without a contract to download the patched version ? There should be a go-to version of 8.5 for instance that people would be able to download to fix this vulnerability. Is that available somewhere ? Thank you.
12-08-2017 05:31 AM
12-08-2017 03:33 PM
@richar_f wrote:
What are the options, please, for customers using Mobility Express on a 1852i for instance, and without a contract to download the patched version ? There should be a go-to version of 8.5 for instance that people would be able to download to fix this vulnerability. Is that available somewhere ? Thank you.
Read my post above.
Carefully read the Cisco Security Advisory called "Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II" and scroll down to the "Customers Without Service Contracts" section. Read very, very carefully the first two paragraphs with emphasis on the second paragraph.
Hope this helps.
Please don't forget to rate our useful posts.
10-17-2017 11:17 PM
10-17-2017 11:33 PM
Many thanks
Cheers..
Pavan P
10-18-2017 01:39 AM
10-18-2017 02:08 AM
@ivanchakarov wrote:
What about the clients that are using older software - 7.4 for example?
7.4.X.X is already end-of-support. So no fixes for that version.
10-19-2017 02:21 AM
Group key (GTK) reinstallation when processing a Wireless Network Management (WNM) Sleep Mode Response frame
A vulnerability in the processing of the 802.11v (Wireless Network Management) Sleep Mode Response frames could allow an unauthenticated, adjacent attacker to force a supplicant that is compliant with the 802.11v standard to reinstall a previously used group key.
The vulnerability is due to ambiguities in the processing of associated protocol messages. An attacker could exploit this vulnerability by passively eavesdropping and retransmitting previously used WNM Sleep Mode Response frames.
This vulnerability has been assigned the following CVE ID: CVE-2017-13087
can you suggest on above vulnerability ..
10-19-2017 03:09 AM - edited 10-20-2017 04:43 PM
@pavan.pawar wrote:
can you suggest on above vulnerability ..
I don't understand the question.
Cisco is going to publish the software fix on 23 October 2017.
I just want to repeat this over and over again: Cisco's software fix is only going to fix one of ten vulnerabilities. Patching the client will fix 9 of the 10.
10-19-2017 04:40 AM
what about the boot version ?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide