krack hack patch

I learned today that wifi routers (AirPort Extreme) can be hacked with KRACK. Is there a fix for this?

iPhone 6, iOS 8.3

Posted on Oct 16, 2017 3:53 PM

Reply
Question marked as Top-ranking reply

Posted on Oct 19, 2017 5:05 PM

Please, people, educate yourselves. The hack is limited to clients and has to do with the WPA2 4 handshake protocol. The hack is made possible by the CLIENT’s response to the fourth handshake, not the authenticator (router). The flaw has been around since day 1 of the WPA2 implementation. It’s a flaw in how the protocol was implemented. This is NOT an Apple only issue. Any device that uses WPA2 is affected. The router is not the base cause and cannot be hacked unless it acting as a client to another router, something almost no home network does. If you want to educate yourself and find out what’s really going on trying watching this video. It’s about twenty minutes long and will tell you everything you want to know about KRACK in great detail. Apple Wi-Fi clients have all been patched in current beta releases. No need to panic or be paranoid.


https://twit.tv/shows/security-now/episodes/633?autostart=false


Fast forward to the 1:32:08 point and listen.


And finally, Apple has NOT stopped support of its networking products. It was a rumor based on another rumor that claimed Apple was reassigning engineers from its networking products team to other projects. RUMOR only, no verification and no confirmation from Apple. Apple networking products are supported and available at Apple stores, online, and at resellers like Best Buy and Amazon. Like the Mac Mini, the Airport and Time Capsule haven’t seen hardware updates in a few years. That does not mean they are no longer supported so STOP with the babbling nonsense.

32 replies
Question marked as Top-ranking reply

Oct 19, 2017 5:05 PM in response to North woods

Please, people, educate yourselves. The hack is limited to clients and has to do with the WPA2 4 handshake protocol. The hack is made possible by the CLIENT’s response to the fourth handshake, not the authenticator (router). The flaw has been around since day 1 of the WPA2 implementation. It’s a flaw in how the protocol was implemented. This is NOT an Apple only issue. Any device that uses WPA2 is affected. The router is not the base cause and cannot be hacked unless it acting as a client to another router, something almost no home network does. If you want to educate yourself and find out what’s really going on trying watching this video. It’s about twenty minutes long and will tell you everything you want to know about KRACK in great detail. Apple Wi-Fi clients have all been patched in current beta releases. No need to panic or be paranoid.


https://twit.tv/shows/security-now/episodes/633?autostart=false


Fast forward to the 1:32:08 point and listen.


And finally, Apple has NOT stopped support of its networking products. It was a rumor based on another rumor that claimed Apple was reassigning engineers from its networking products team to other projects. RUMOR only, no verification and no confirmation from Apple. Apple networking products are supported and available at Apple stores, online, and at resellers like Best Buy and Amazon. Like the Mac Mini, the Airport and Time Capsule haven’t seen hardware updates in a few years. That does not mean they are no longer supported so STOP with the babbling nonsense.

Nov 1, 2017 4:32 PM in response to AncientGeek

Don't think you fully understood what was mentioned in an earlier post.


I got that information, which assumed that the AirPorts were acting as routers.


But....if the AirPorts are configured to act as extenders, or an AirPort Express is set up to join a network for AirPlay.....the devices "join" a wireless network as wireless clients.....so they are not acting as routers.


It is the clients on a network that are subject to attack, just like any other client....a computer, a mobile device, a TV, a thermostat, etc.


So, Apple provided fixes for other clients.....Macs running High Sierra, Sierra and El Capitan, and iPhones/iPads running a current iOS operating system, the AppleTV4, and others.....but no fix for the AirPorts when they act as clients.

Oct 19, 2017 3:15 AM in response to marchetti6AB

Ken,


If Apple Airport devices are indeed vulnerable to the Krack Hack and if you live in an area where it is likely someone with the right tools and motivation could connect to your WiFi signal, then any device communicating via WiFi to your base stations would be vulnerable. I haven’t followed the iMore link above to verify if Apple devices are or are not vulnerable, but the issue as I understand it allows a properly skilled and equipped person to crack (or change in the case of Android) the WPA2 key and subsequently monitor Wi-Fi traffic between Wi-Fi connected devices and your Wi-Fi access point(s).


There are a few “ifs” there, but the point is that the vulnerability has to do with Wi-Fi traffic regardless of how your network devices are connected to each other.


Update...

This is what iMore said about Apple products...


“Update: Apple has told iMore that KRACK has already been fixed in the beta versions of iOS, macOS, watchOS, and tvOS, and that AirPort routers and Time Capusules don't appear to be vulnerable too the exploit.”

Oct 19, 2017 6:07 AM in response to AncientGeek

“Update: Apple has told iMore that KRACK has already been fixed in the beta versions of iOS, macOS, watchOS, and tvOS, and that AirPort routers and Time Capusules don't appear to be vulnerable too the exploit.”

If you are really interested in what Apple will or will not do regarding this issue, you might want to wait for an official statement from Apple.

Nov 5, 2017 12:48 AM in response to lkrupp

Correct technically. However Apple AirPorts are frequently used as clients to other wifi networks. The AirPort Express can be joined in client mode to share it's audio port. All of them can connect as clients to extend wifi range wirelessly, and to share their USB ports. This is certainly not something that "almost no home network does". Therefore I would wait for Apple themselves to confirm, but if your AirPorts aren't wired by ethernet, you should consider them vulnerable.

Nov 9, 2017 5:44 AM in response to alex95129

Please look at previous posts in this thread to see that your question has already been answered. Here are some excerpts:


this fixes Apple devices

Not quite, unless I missed something from the Apple "updates".


What if you have an AirPort Express, AirPort Extreme or AirPort Time Capsule acting as a wireless extender for the network? In order to do this, the AirPort must be configured to operate as a wireless client on the network, just like any other wireless device that might connect to the network.


If there was a firmware "fix" for AirPorts behaving as wireless clients on a network.....just like any of the other wireless clients that you have named above.....TVs, thermostats, smart home devices, etc......I missed it.


No firmware updates have appeared for the AirPorts....or....did I miss something?


And


Don't think you fully understood what was mentioned in an earlier post.


I got that information, which assumed that the AirPorts were acting as routers.


But....if the AirPorts are configured to act as extenders, or an AirPort Express is set up to join a network for AirPlay.....the devices "join" a wireless network as wireless clients.....so they are not acting as routers.


It is the clients on a network that are subject to attack, just like any other client....a computer, a mobile device, a TV, a thermostat, etc.


So, Apple provided fixes for other clients.....Macs running High Sierra, Sierra and El Capitan, and iPhones/iPads running a current iOS operating system, the AppleTV4, and others.....but no fix for the AirPorts when they act as clients.

Nov 14, 2017 5:38 AM in response to Chris1534

When is there a patch by Apple

This is a question that only Apple can answer. No one here on a user-to-user support forum will know what Apple is planning to do, or when they might be planning to do it.


If you are concerned about this issue....and you cannot connect the AirPorts together using a wired Ethernet connection.....I would suggest that you return the Apple router for a refund.

Oct 16, 2017 4:12 PM in response to North woods

Before you start running around shouting the sky is falling..


1. This has only been discovered and mechanism released today as research paper. To get those as tools for hackers could take sometime.. the average hacker is buying the script.. not writing their own.


2. For this attack to work, a person must be in your immediate vicinity with suitable equipment.. this has to be done by direct connection to your wifi.. if you live in apartment block filled with people who never leave and are feed by continuous stream of pizza delivery.. be worried.. if you live in normal suburban area, where the number of people is small, who could actually connect to your wifi.. be alert not alarmed.. the world is not ending tomorrow.. or even the day after. watch out for black vans with blacked out windows in front of your house.. but that is true at any time.


3. If you own android it is far worse than iOS although the hint is linux and MacOS are pretty vulnerable.

Oct 19, 2017 8:34 AM in response to Bob Timmons

AirPort routers and Time Capusules don't appear to be vulnerable too the exploit

That's reassuring as ****! (I meant the place you go when you die and don't go to heaven, not the F word, btw)

Also, I doubt old TC, if vulnerable, will get an update.

(not gonna rant about it - had a huge post but we'll stick with that)


3. If you own android it is far worse than iOS although the hint is linux and MacOS are pretty vulnerable.

The first being worst than the second says nothing about the second and being an Apple customer one should care less than nothing about other devices.

(I understand what's ament to say but Android is Google/third party problem, not Apple's customers)

Nov 1, 2017 2:47 PM in response to marchetti6AB

Well, this fixes Apple devices but I’m, betting you have numerous non-Apple devices that may or may not get patched. Most HDTVs connect to your home network these days with Wi-Fi. So do Blu-ray players, AVR stereo systems, game systems, smart home devices like thermostats, lights, switches, door locks, refrigerators, garage door openers. Wi-Fi has become ubiquitous and any of those devices can be targeted to get access to your home Wi-Fi network. Will your thermostat or garage door opener get updates? Think about that.

Nov 1, 2017 3:05 PM in response to lkrupp

this fixes Apple devices

Not quite, unless I missed something from the Apple "updates".


What if you have an AirPort Express, AirPort Extreme or AirPort Time Capsule acting as a wireless extender for the network? In order to do this, the AirPort must be configured to operate as a wireless client on the network, just like any other wireless device that might connect to the network.


If there was a firmware "fix" for AirPorts behaving as wireless clients on a network.....just like any of the other wireless clients that you have named above.....TVs, thermostats, smart home devices, etc......I missed it.


No firmware updates have appeared for the AirPorts....or....did I miss something?

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

krack hack patch

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.