This site may earn affiliate commissions from the links on this folio. Terms of use.

Conventional wisdom has long held that locking down your router with WPA2 encryption protocol would protect your information from snooping. That was truthful for a long fourth dimension, but maybe not for much longer. A massive security disclosure details vulnerabilities in WPA2 that could let an aggressor intercept all your precious information, and virtually every device with Wi-Fi is affected.

The vulnerability has been dubbed a Key Reinstallation Attack (KRACK) by discoverers Mathy Vanhoef and Frank Piessens of KU Leuven. It's not specific to any specific piece of hardware or device–it'southward a flaw in the WPA2 standard itself. KRACK bears some resemblance to standard "man in the center" attacks by impersonating an existing network.

To exploit a network, attackers first clone the MAC address of the network and fix a duplicate of it on a different wireless aqueduct. Devices connecting to the original can exist forced onto the fake network. That would usually be incommunicable because of the non-matching AES encryption keys in WPA2, but KRACK leverages a flaw in the four-way handshake that confirms the match.

Normally, WPA2 keys require a unique encryption key for each network frame. The KRACK vulnerabilities allow the rogue network to reuse erstwhile keys and reset the counter to make them valid again. At that point, it becomes trivially piece of cake to decrypt traffic coming from a device.

At that place are multiple variants of this assault. The well-nigh severe version affects all current Linux distros and all Android devices running 6.0 or higher. Apple'due south macOS is vulnerable to almost as many variants, just Windows is merely afflicted by one version or KRACK. The iOS platform doesn't have the most astringent vulnerability, but several others practice work. Co-ordinate to the researchers, every operating organization and piece of networking hardware is susceptible to at least one flavor of KRACK.

And then, what can you do almost this? Not a whole lot right now. The issue exists on most all devices, and it's upwards to vendors to release patches. Some router makers have started deploying fixes for enterprise-class hardware. Microsoft has released a patch for its limited vulnerabilities, too. A few Linux distros accept patches live, but it'll take fourth dimension for everyone to catch upwards.

Android devices are trickier. Google says it volition have patches complete for existing devices in the coming weeks, only it'south upwardly to individual OEMs to scroll them out. Since information technology'south more often than not newer phones that are afflicted, information technology shouldn't be too much of a hassle. Whatsoever device with the November 2022 patch level or later will be protected.

Now read: 20 Best Privacy Tips