02-27-2020 11:01 AM
Cisco has identified 14 wireless devices so far that are vulnerable to the new Kr00k vulnerability (CVE-2019-15126)
No mention of any Meraki wireless equipment yet.
Has anybody heard differently yet?
Solved! Go to Solution.
05-05-2020 01:27 PM
@jgbright just wanted to come back and close the loop on this one regarding kr00k (CVE ID: CVE-2019-15126, CVSSv3 Base Score: 3.1) that hit back in late February. Meraki MR26, MR32, MR34 and MR72 and MX64W, MX65W use the impacted chips and are affected by this vulnerability.
More info here.
and
https://meraki.cisco.com/blog/cisco-meraki-customer-advisories/
02-27-2020 11:07 AM
I have not heard any reports of Meraki APs being affected but will double check. All of the recent and current APs do not use Broadcom or Cypress chipsets and are not vulnerable, but some of the older End-of-Sale APs had Broadcom, that's what I'll check on and get back to you.
04-28-2020 02:06 PM
Yes, you right,
I also didn't face any vulnerability in our environment. And didn't get any update from Meraki side.
02-27-2020 11:09 AM
And here's the link to the Cisco announcement:
02-27-2020 11:16 AM
02-27-2020 11:15 AM
This is being accessed by our Security Team. Updates to follow.
03-02-2020 01:30 PM
Meraki is aware of the CVE-2019-15126 vulnerability (also commonly known as Kr00k). At this time, Meraki is evaluating the impact and the affected products (if any). We will provide updates as we make progress to ensure the security of our products.
03-06-2020 08:58 AM
Update:
None of our orderable 802.11ac Wave 2 (MR20, MR33, MR30H, MR42, MR52, MR53, MR42E, MR53E, MR70, MR74, MR84) or 802.11ax (WiFi-6) Access Points (MR45, MR55, MR36, MR46, MR56) are susceptible to this vulnerability.
Older APs not listed above may be affected, and more updates on those SKUs will be provided soon.
03-06-2020 09:05 AM
03-16-2020 08:11 AM
03-20-2020 02:50 PM
Still in progress. We are in uncharted territory right now with the global coronavirus pandemic, so we should expect responses to/from other teams that are involved to be delayed. I hope you understand. Thanks.
04-23-2020 04:21 PM
Cisco Meraki Customer Advisories page has been updated with the relevant information.
04-28-2020 12:56 AM
A quick summary:
WPA2 security can be bypassed on some devices.
For the MX64W and MX65W you need 15.28 to no longer be vulnerable.
For the MR26, MR32, MR34 and MR72 you need 26.8, which is due to be available in May.
Boy, am I glad we are in lockdown, we have ~30 affected devices and our corporate SSID currently uses WPA2!
05-05-2020 01:27 PM
@jgbright just wanted to come back and close the loop on this one regarding kr00k (CVE ID: CVE-2019-15126, CVSSv3 Base Score: 3.1) that hit back in late February. Meraki MR26, MR32, MR34 and MR72 and MX64W, MX65W use the impacted chips and are affected by this vulnerability.
More info here.
and
https://meraki.cisco.com/blog/cisco-meraki-customer-advisories/
05-06-2020 01:11 AM
Version 26.8 now available to upgrade.
Looks like it's also the initial stable firmware for some unreleased access points too ... unless I've missed a webinar.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide