HAWKINGTECH statement related to vulnerabilities of the WPA2 protocol
(KRACK- Key Reinstallation AttaCKs)
In regards to the KRACK handshake process vulnerability issue (hereinafter referred to as “Vulnerability”) that was announced recently, Hawking Technology immediately started to work directly with our engineers in order to find a fast and appropriate solution.
This Vulnerability affects WiFi client devices, WiFi repeaters, WiFi access points and routers with the IEEE 802.11r feature. However, WiFi access points and routers that do not integrate the IEEE 802.11r feature are free from this Vulnerability.
Please refer to: https://www.krackattacks.com/#details for more technical information.
For all existing HAWKING TECHNOLOGY products please see the information below to assess the impact of this Vulnerability:
A. HAWKING TECHNOLOGY Range Extender and wireless NIC. We will release a new patch to solve this issue shortly.
B. HAWKING TECHNOLOGY Wi-Fi Router or Access point without 802.11r and are only using it as the wireless base are considered free from this vulnerability. If user configured it as repeater mode or client mode, please switch it back to as wireless base Assess point mode until HAWKING TECHNOLOGY provides the necessary patch.
C. HAWKING TECHNOLOGY Switches, PLC and Ethernet NIC Card products performing as Wired and without Wi-Fi features are considered free from this vulnerability.
The corresponding security patch schedule will be released shortly.
Should you have any questions or concerns, please feel free to contact your HAWKING TECHNOLOGY representative