30-10-2017 08:43 AM
Can you please tell me what Videotron is doing to ensure its clients are protected from the above vulnerability?
Solved! Go to Solution.
30-10-2017 07:09 PM
It seems like Harkane provided information about the WPA2 Krack Flaw over here : Information for the WPA2 KRACK Flaw and Videotron's Zyxel router
According to Zyxel:
The only routers affected are those with the 802.11r Fast-BSS Transition (FT) handshake feature. Those are models NWA5301-NJ, NWA5123-AC, WAC6103D-I and WAC6500 series. If you have one of those models, you will have to wait for February 2018 for a fix. You can also turn off that feature (see link above) to prevent been affected by the flaw.
Videotron's latest router is actually Zyxel's EMG2926 and is not in the list.
Zyxel's position on this is that those models not included are not affected: "For products not listed, they are not affected to the attacks either because they are not designed to act as WiFi clients, do not support 802.11r Fast-BSS Transition handshake, or do not support peer-key handshake by default."
That should clear it up.