Security Vulnerabilities Disclosed for SAE Handshake – no update needed for Cisco Wireless products
On April 10, 2019, a research paper entitled Dragonblood: Analysing WPA3’s Dragonfly Handshakewas made publicly available. This paper describes how the Simultaneous Authentication of Equals (SAE) handshake, defined in IEEE-802.11-2016 and implemented as part of the Wi-Fi Alliance’s Wi-Fi Protected Access 3 (WPA3) security suite, has recently been identified to have multiple vulnerabilities.
Cisco Access points are not affected by any of the vulnerabilities described. The Cisco AireOS and IOS-XE releases that support SAE for WPA3-Personal will also include protection mechanisms against these vulnerabilities. WPA3 clients may need to be updated and Cisco recommends finding the latest information from vendors’ websites.
Although no Cisco products are affected, Cisco understands that customers are interested in understanding the vulnerabilities in order to assess WPA3 clients’ vulnerabilities. A longer document details the vulnerabilities found and possible exposures:
Hi to all, Recently i'm having trouble connecting the AnyConnect Secure Mobility app when on the go with my iPhone Hotspot. In the beginning ithe connection was perfect. like one month ago the app in my SurfacePro starts to Connecting and...
Have you wondered about 5G and how it will affect your business? We have the answers for you.
Learn about Cisco products and solutions related to 5G and Wi-Fi 6.
5 things to know about Wi-Fi 6 and 5G
5G white paper
Cisco 5G cloud-to-client-network...