Safeguard Your Organization Against The KRACK Vulnerability – Charles Leaver

By | October 26, 2017

Written By Dr Al Hartmann And Presented By Charles Leaver

 

Enough press has been generated over the Wi-Fi WPA2-defeating Key Reinsertion Attack (KRACK), that we don’t need to re-cover that again. The initial discoverer’s site is an excellent location to review the problems and connect to the detailed research paper. This may be the most attention paid to a core communications security failure since the Heartbleed attack. In that earlier attack, a patched variation of the vulnerable OpenSSL code was launched on the very same day as the general disclosure. In this brand-new KRACK attack, comparable responsible disclosure standards were followed, and patches were either currently launched or quickly to follow. Both wireless endpoints and wireless network devices need to be properly patched. Oh, and all the best getting that Chinese knockoff wireless security camera bought off eBay patched quickly.

Here we will just make a couple of points:

Take inventory of your wireless devices and follow up to ensure appropriate patching. (Ziften can carry out passive network stock, consisting of wireless networks. For Ziften monitored end points, the readily available network interfaces in addition to applied patches are reported.) For enterprise IT staff, it is patch, patch, patch every day anyhow, so absolutely nothing brand-new here. But any unmanaged wireless devices must be identified and vetted.

Windows and iOS end points are less prone, while unpatched Android and Linux end points are highly prone. The majority of Linux endpoints will be servers without wireless networking, so not as much exposure there. But Android is another story, especially provided the balkanized state of Android upgrading throughout device manufacturers. More than likely your enterprise’s greatest exposure will be IoT and Android devices, so do your risk analysis.

Prevent wireless access by means of unencrypted protocols such as HTTP. Stick to HTTPS or other encrypted protocols or utilize a safe VPN, but be aware some default HTTPS sites enable compromised devices to coerce downgrade to HTTP. (Note that Ziften network monitoring reports IP addresses and ports used, so take a look at any wireless port 80 traffic on endpoints that are unpatched.).

Continue whatever wireless network health practices you have actually been using to identify and silence rogue access points, unapproved wireless devices, etc. Grooming access point positioning and transmission zones to decrease signal spillage outside your physical borders is likewise a sensible practice, since KRACK opponents must exist locally within the wireless network. Do not give them advantaged placement opportunities within or close by to your environment.

For a more broad discussion around the KRACK vulnerability, check out our current video on the topic:

Leave a Reply

Your email address will not be published. Required fields are marked *