{"id":81346,"date":"2017-10-23T08:53:28","date_gmt":"2017-10-23T15:53:28","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=81346"},"modified":"2025-06-02T03:16:24","modified_gmt":"2025-06-02T10:16:24","slug":"kracks-five-observations-on-wpa-authentication-vulnerability","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/","title":{"rendered":"KRACKs: Five Observations on WPA Authentication Vulnerability"},"content":{"rendered":"<p>KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts:<\/p>\n<ul>\n<li><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/kracks-against-wi-fi-serious-but-not-end-of-the-world\/\" target=\"_blank\" rel=\"noopener\">\u201cKRACKs Against Wi-Fi Serious But Not End of the World\u201d<\/a><\/li>\n<li><a href=\"https:\/\/securingtomorrow.mcafee.com\/trusted-advisor\/krack-threatens-wi-fis-security-underpinnings-means\/\" target=\"_blank\" rel=\"noopener\">\u201cHow KRACK Threatens Wi-Fi\u2019s Security Underpinnings and What It Means for You\u201d<\/a><\/li>\n<\/ul>\n<h2>Here are five observations that offer an easy-to-digest summary:<\/h2>\n<ul>\n<li>Don\u2019t panic! Remember this is currently only a vulnerability. We have not yet seen any attempts to exploit it. Attacks may come, but they will be dependent on the difficulty of implementing code along with the hacker community\u2019s requirement that any attacks must be sufficiently successful to give them a return on their \u201cinvestment.\u201d<\/li>\n<li>An attack requires the actor to either be in close proximity or use an antenna large enough to both receive your Wi-Fi signals and send Wi-Fi packets to your router. This is a lower risk than remote exploits that can be conducted across the Internet, simultaneously affecting hundreds or thousands of devices.<\/li>\n<li>Not all wireless devices are equal. Smart TVs, set-top boxes, and other wireless digital streamers are unlikely to be considered high-value targets. For devices containing sensitive data, consider switching to a wired network.<\/li>\n<li>Although this potential attack vector does not benefit from weak site passwords or the router\u2019s WPA2 password, a number of alternative vectors do exploit weak or default passwords. That danger has not changed. Your security is only as strong as your weakest link, so think broadly about your security rather than just focusing on the latest issue.<\/li>\n<li>A consistent security best practice is to keep devices up to date to offer protection against known vulnerabilities. That advice remains true in this case, too. If your vendor releases a fix, apply it.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts:&#8230;<\/p>\n","protected":false},"author":949,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,4452,18],"coauthors":[5247],"class_list":["post-81346","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybersecurity","tag-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>KRACKs: Five Observations on WPA Authentication Vulnerability | McAfee Blog<\/title>\n<meta name=\"description\" content=\"KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts: \u201cKRACKs Against Wi-Fi Serious\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KRACKs: Five Observations on WPA Authentication Vulnerability | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts: \u201cKRACKs Against Wi-Fi Serious\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-23T15:53:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T10:16:24+00:00\" \/>\n<meta name=\"author\" content=\"Graham Clarke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gclarkesecurity\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Clarke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/\"},\"author\":{\"name\":\"Graham Clarke\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/3ae7186b9d128cc4d17e51e1dac20f7d\"},\"headline\":\"KRACKs: Five Observations on WPA Authentication Vulnerability\",\"datePublished\":\"2017-10-23T15:53:28+00:00\",\"dateModified\":\"2025-06-02T10:16:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/\"},\"wordCount\":292,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"computer security\",\"cybersecurity\",\"network security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/\",\"name\":\"KRACKs: Five Observations on WPA Authentication Vulnerability | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2017-10-23T15:53:28+00:00\",\"dateModified\":\"2025-06-02T10:16:24+00:00\",\"description\":\"KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts: \u201cKRACKs Against Wi-Fi Serious\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"KRACKs: Five Observations on WPA Authentication Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/3ae7186b9d128cc4d17e51e1dac20f7d\",\"name\":\"Graham Clarke\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/c5dcfbbde8dcfb640cf188d2d8b3435e\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/Graham-Clarke-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/Graham-Clarke-96x96.jpg\",\"caption\":\"Graham Clarke\"},\"description\":\"Graham Clarke has over 20 years\u2019 experience working in IT security, covering a range of threat and data protection products. He ran the engineering team responsible for McAfee\u2019s first email appliance and currently runs the team responsible for McAfee\u2019s Data Protection products (DLP, encryption and Database Security).\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/grahamclarke1\/\",\"https:\/\/x.com\/gclarkesecurity\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/graham-clarke\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KRACKs: Five Observations on WPA Authentication Vulnerability | McAfee Blog","description":"KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts: \u201cKRACKs Against Wi-Fi Serious","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"KRACKs: Five Observations on WPA Authentication Vulnerability | McAfee Blog","og_description":"KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts: \u201cKRACKs Against Wi-Fi Serious","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-10-23T15:53:28+00:00","article_modified_time":"2025-06-02T10:16:24+00:00","author":"Graham Clarke","twitter_card":"summary_large_image","twitter_creator":"@gclarkesecurity","twitter_site":"@McAfee","twitter_misc":{"Written by":"Graham Clarke","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/"},"author":{"name":"Graham Clarke","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/3ae7186b9d128cc4d17e51e1dac20f7d"},"headline":"KRACKs: Five Observations on WPA Authentication Vulnerability","datePublished":"2017-10-23T15:53:28+00:00","dateModified":"2025-06-02T10:16:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/"},"wordCount":292,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["computer security","cybersecurity","network security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/","name":"KRACKs: Five Observations on WPA Authentication Vulnerability | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2017-10-23T15:53:28+00:00","dateModified":"2025-06-02T10:16:24+00:00","description":"KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts: \u201cKRACKs Against Wi-Fi Serious","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/kracks-five-observations-on-wpa-authentication-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"KRACKs: Five Observations on WPA Authentication Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/3ae7186b9d128cc4d17e51e1dac20f7d","name":"Graham Clarke","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/c5dcfbbde8dcfb640cf188d2d8b3435e","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/Graham-Clarke-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/Graham-Clarke-96x96.jpg","caption":"Graham Clarke"},"description":"Graham Clarke has over 20 years\u2019 experience working in IT security, covering a range of threat and data protection products. He ran the engineering team responsible for McAfee\u2019s first email appliance and currently runs the team responsible for McAfee\u2019s Data Protection products (DLP, encryption and Database Security).","sameAs":["https:\/\/www.linkedin.com\/in\/grahamclarke1\/","https:\/\/x.com\/gclarkesecurity"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/graham-clarke\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/949"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=81346"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81346\/revisions"}],"predecessor-version":[{"id":214842,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81346\/revisions\/214842"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=81346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=81346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=81346"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=81346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}