Forums - About "Partly vulnerable to WPA-KRACK"

5 posts / 0 new
Last post
About "Partly vulnerable to WPA-KRACK"
544038381
Join Date: 13 Sep 15
Posts: 16
Posted: Wed, 2019-10-23 00:18
Dear all I have a question about "Partly vulnerable to WPA-KRACK". The below message describe the krack. KRACK is a set of vulnerabilities which are partly in the Wi-Fi standard itself but also specific implementations. It attacks the 4-way handshake of the WPA protocol. This handshake is executed when a station (Wi-Fi client) wants to join a protected Wi-Fi network. It is used to confirm that both the station (STA) and the access point (AP) possess the correct credentials, e.g. a pre-shared key. The WPA-KRACK vulnerability was originally discovered 2017 by Mathy Vanhoef (Katholieke Universiteit Leuven), who provides a publicly available test suite athttps://github.com/vanhoefm/krackattacks-scripts. In 2018, new vulnerabilities were disclosed. The test suite contains tests for the original published vulnerabilities and the 2018 published ones. Could you somebody know this krack about QCA4004B? Whether Qualcomm had been repaired it or not? Hope to get your reply. Best Regards
  • Up0
  • Down0
jbhanu Moderator
Join Date: 6 Feb 17
Posts: 80
Posted: Wed, 2019-10-23 21:48

Hi  , 

Yes . We do support fix for this Partly vulnerable to WPA-KRACK . Could you please let me know which SP/SDK version you are using ??

 

Thanks 

  • Up0
  • Down0
544038381
Join Date: 13 Sep 15
Posts: 16
Posted: Thu, 2019-10-24 01:01

Dear Jbhanu

My SDK version show below

ProductDistributionContextECCNSerial NumberQCA4004.TX.1.4CS 0.0.006.1.113370.1.133872.1OEM5D002.C.1149708

Image

Build/LabelDistro PathFormatCNSS.KF.3.6CNSS.KF.3.6-00006-KF112-1.113370.1.133872.1targetSRC-FW
CNSS.KF.3.6CNSS.KF.3.6-00006-KF112-1.113370.1.133872.1targetHDR
CNSS.KF.3.6CNSS.KF.3.6-00006-KF112-1.113370.1.133872.1targetSRC-AJHL

 Could you offer the patch file to me?

Best Regards

  • Up0
  • Down0
544038381
Join Date: 13 Sep 15
Posts: 16
Posted: Thu, 2019-10-24 01:06

Dear Jbhanu

My SDK version is

Product                    Distribution                                     Context ECCN              Serial Number

QCA4004.TX.1.4 CS 0.0.006.1.113370.1.133872.1 OEM 5D002.C.1        149708

Image Build/Label Distro Path Format

CNSS.KF.3.6 CNSS.KF.3.6-00006-KF112-1.113370.1.133872.1 target SRC-FW
CNSS.KF.3.6 CNSS.KF.3.6-00006-KF112-1.113370.1.133872.1 target HDR
CNSS.KF.3.6 CNSS.KF.3.6-00006-KF112-1.113370.1.133872.1 target SRC-AJHL
 
Could you offer the patch file to me?
 
Best Regards
  • Up0
  • Down0
544038381
Join Date: 13 Sep 15
Posts: 16
Posted: Tue, 2019-11-19 18:53

Dear Jbhanu 

Thanks for your reply, I am sorry to reply you later. We recently retested it with a test tool that uses the Wireless adapter (model: awus036nha) , and run the test step based on description from the URL "https://github.com/vanhoefm/krackattacks-scripts" , followed these steps to test, but we failed on step 2 and Step 6. 

Hope to get your reply. 

Best Regards

  • Up0
  • Down0
or Register

Opinions expressed in the content posted here are the personal opinions of the original authors, and do not necessarily reflect those of Qualcomm Incorporated or its subsidiaries (“Qualcomm”). The content is provided for informational purposes only and is not meant to be an endorsement or representation by Qualcomm or any other party. This site may also provide links or references to non-Qualcomm sites and resources. Qualcomm makes no representations, warranties, or other commitments whatsoever about any non-Qualcomm sites or third-party resources that may be referenced, accessible from, or linked to this site.