[196303] in North American Network Operators' Group
Re: Gonna be a long day for anybody with CPE that does WPA2..
daemon@ATHENA.MIT.EDU (Brielle)
Tue Oct 17 05:03:00 2017
X-Original-To: nanog@nanog.org
From: Brielle <bruns@2mbit.com>
In-Reply-To: <20171016135151.GA29297@ussenterprise.ufp.org>
Date: Mon, 16 Oct 2017 08:14:36 -0600
To: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
Ubiquiti already has it patched in UniFi firmware release 3.9.3 (see forums f=
or more detail, or I'll be doing a sticky post in /r/ubiquiti later). 3.8.1=
5 for Broadcom based APs like the first gen UAP-AC and ACv2 should be soon f=
rom what I read.
Don't know about Airmax yet though.
So, any bets on the likelihood of consumer gear getting fixes or are we pret=
ty much only expecting prosumer and higher to actually get fixed?
Sent from my iPad
> On Oct 16, 2017, at 7:51 AM, Leo Bicknell <bicknell@ufp.org> wrote:
>=20
> In a message written on Mon, Oct 16, 2017 at 03:38:19AM -0400, valdis.klet=
nieks@vt.edu wrote:
>> And it looks like we're all going to be reflashing a lot of devices.
>=20
> Based on my reading this morning many (but not all) of the attacks are
> against _clients_ with no way to migitate by simply upgrading AP's.
>=20
> Sure, Windows, Mac, Linux...but also Android and iOS...and that "smart"
> TV, the streaming stick plugged into it, the nanny cam, etc, etc, etc.
>=20
> :(
>=20
> --=20
> Leo Bicknell - bicknell@ufp.org
> PGP keys at http://www.ufp.org/~bicknell/