- Home »
- About »
- News - Archive »
- How are DrayTek wireless products affected by the WPA2 KRACK vulnerability?
How are DrayTek wireless products affected by the WPA2 KRACK vulnerability?
When DrayTek wireless products, such as wireless routers and access points, are used as wireless base stations, they are not affected by the KRACK (Key Reinstallation AttaCK) vulnerability; therefore patches or updates are not required.
However, other devices connecting to DrayTek products and functioning as wireless clients (e.g., mobile phones, tablets, laptops, and etc.,) could be vulnerable. You should check with device vendors to determine if updates are needed.
When DrayTek products are used as wireless clients and access to the Internet with universal repeater or wireless WAN modes, the wireless traffic is susceptible to interception as the router or access point is acting as a wireless client. DrayTek will be releasing firmware updates to address the issue starting next week.
Routers with wireless WAN support, and their corresponding fixed firmware versions:
- Vigor2862 wireless series, version 3.8.7
- Vigor2860 wireless series, version 188.8.131.52
- Vigor2830v2 wireless series, version 3.8.5
- Vigor2925 wireless series, version 3.8.5
- Vigor2912 wireless series, version 3.8.5
- Vigor2120 wireless series, version 3.8.5
*Please note that routers that are not listed above are not affected by the KRACK vulnerability.
Access points with universal repeater or Station-Infrastructure support, and their corresponding fixed firmware versions:
- AP910C, version 184.108.40.206
- AP900, version 220.127.116.11
- AP902, version 1.2.3
- AP810, version 1.2.3
- AP710, version 1.2.3
- AP800, version 18.104.22.168