TP-LINK Information for VU#228519

Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse

Status

Affected

Vendor Statement

Recently we have already received feedback about the KRACK vulnerabilities.

    After checking the detailed information of this vulnerability, we have found that some of our products are affected by it.
    We have published a security advisory on our official website and we are working to solve the problems now.
    Here are the links:
    Security Advisory: http://www.tp-link.com/en/faq-1970.html
    Software updates for the affected devices will be post at www.tp-link.com/support.html<http://www.tp-link.com/support.html> over the next few weeks.

    Vendor Information

    We are not aware of further vendor information regarding this vulnerability.

    Vendor References

    http://www.tp-link.com/ph/faq-1970.html

http://www.tp-link.com/support.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.