WatchGuard Support Center

Knowledge Base - Article

 KRACK WPA and WPA2 Wireless Vulnerabilities

Tracking ID: CVE-2017-13077 through CVE-2017-13088
Status: Resolved
Article Number: 000015892
Severity: High
On 16 October 2017, security researchers from the University of Leuven disclosed a vulnerability in the WPA and WPA2 wireless encryption standards that could allow an attacker to decrypt wireless traffic from a vulnerable client. These are protocol-level vulnerabilities and are assumed to affect all industry implementations of the standard in wireless infrastructure devices and wireless clients. This security flaw means that, for vulnerable clients and access points, WPA and WPA2-encrypted Wi-Fi traffic is no longer secure until certain steps are taken to remediate the issue. The Wi-Fi data stream, including passwords and personal data, can be intercepted, decrypted, and modified without a user's knowledge.

All WatchGuard products with wireless functionality are affected by this vulnerability:
  • Access Points: AP100, AP102, AP120, AP200, AP300, AP320, AP322, AP327X, AP420
  • Appliances: XTM 25-W, 26-W, 33W, Firebox T10-W, T30-W, T50-W
No workaround exists at this time.

Updates are available for Fireware and WatchGuard APs to address the vulnerabilities:
  • AP120, AP320, AP322, AP327X, and AP420 firmware -- v8.3.0-657 and higher
  • AP300 firmware --┬áv2.0.0.9 and higher
  • AP100, AP102, AP200 firmware -- v1.2.9.14 and higher
  • Appliances: XTM 25-W, 26-W, 33W, Firebox T10-W, T30-W, T50-W -- Fireware v12.0.1 and higher
For additional information, see: