-->
Page 1 of 1

KRACK vulnerability

PostPosted: Wed Oct 18, 2017 9:15 am
by LegacyOfHerot
I've been reviewing the hardware specs for the device, but I cant decide if the ESP8266 needs a firmware update or if the WPA2 stack (and thus probably the vulnerability) are baked into the hardware accelerator. Does anyone have a thought? Or a direct line to Expressif's engineering team. No point in asking marketing.

Re: KRACK vulnerability

PostPosted: Sun Oct 22, 2017 2:44 pm
by RichardS
If you check Espressif Website you will find they have dealt with the issue, and I think they completed it DAY 0!

:-)

RichardS

Re: KRACK vulnerability

PostPosted: Mon Oct 23, 2017 7:36 am
by LegacyOfHerot
Thank you, That was my first port of call, obviously, I searched on KRACK:

"Check if your spelling is correct.
Remove quotes around phrases to search for each word individually. bike shed will often show more results than "bike shed".
Consider loosening your query with OR. bike OR shed will often show more results than bike shed."


I guess if they were able to fix it day 0, then it must be patchable in code, which answers my original question. In the mean time, I found another thread on this forum dealing with it, thanks.

Re: KRACK vulnerability

PostPosted: Mon Oct 23, 2017 3:08 pm
by RichardS
Just a slow news day on this site about it....

RichardS