Close this search box.

KRACK Vulnerability Whitepaper


Download PDF


A newly revealed Wi-Fi vulnerability that affects nearly all wireless device, from laptops to smart fridges, demonstrates the likelihood of a fundamental security flaw in the encryption protocol called WPA2, which may allow unauthorised viewing of Wi-Fi traffic. The flaw was published in July 2017 by a researcher who documented widespread vulnerabilities in various implementations of WPA2. All vendors of Wi-Fi equipment and clients where promptly notified through industry-level forums, for the purpose of developing patches. The public disclosure date was agreed for 16 October 2017.

Technical Overview

All Wi-Fi networks that leverage WPA2 are vulnerable. The vulnerability is due to implementation flaws rather than protocol-level weakness. Programmers did not anticipate and guard against a particular set of circumstances when writing the protocol.

Exploitation involves interception and replaying a portion of the initial four-way handshake of the protocol that is conducted when a client authenticates with an access point, and persuades a victim to reinstall a previously used key.

The following conditions limit the potential impact:

  • The attacker needs to establish a man-in-the-middle (MITM) connection between the wireless access point and the victim;
  • The vulnerability is a data link layer attack, which means the effective use of transport layer encryption will protect the data. Properly configured SSL/TLS connections and use of VPNs would in most cases prevent access to unencrypted data;
  • Subsequent decryption attacks are required to view your data compromised by a KRACK vulnerability.

What you need to do

The Gridware intelligence team suggests that most attacks would focus on endpoints, meaning laptops, mobile phones and smart devices, rather than Wi-Fi access points such as routers. If your company runs Windows devices, it is imperative they install the latest patches released in October 2017 which should mitigate the KRACK vulnerability. Patches have also been released by Wi-Fi equipment manufacturers, including ‘Netgear’, ‘Asus’ and ‘TP-Link’ etc., IT teams should accelerate the issuing of those critical patches.

The risk still remains via third parties, (in addition to home networks, off-site offices, concierge desks, airport lounges etc.), so any connection to your company network should be conducted over VPN encryption between the device and the server.

Final Note

Work with your IT team and Information Security advisor to ensure:

  1. All WPA2-connected systems in your company are patched to the latest firmware, including Windows October 10 patch and Internet of Things (IoT) devices, as soon as vendors release those security updates. Prioritise endpoint systems that access wireless networks, ie. employee devices.
  2. Use transport layer encryption, such as HTTPS for websites, TLS for email, and internal VPNs, to protect sensitive data within networks using WPA2.
  3. Finally, continue to use WPA2 in favour of other protocols. Our researchers conclude that despite these vulnerabilities, it remains the most secure option in comparison to other protocols such as WEP.


Sydney Offices
Level 12, Suite 6
189 Kent Street
Sydney NSW 2000
1300 211 235

Melbourne Offices
Level 13, 114 William Street
Melbourne, VIC 3000
1300 211 235

Perth Offices
Level 32, 152 St Georges Terrace
Perth WA 6000
1300 211 235


Learn more about the team at the forefront of the Australian Cyber Security scene.

About Us →

Meet the Team →

Partnerships →

Learn more about the team at the forefront of the Australian Cyber Security scene.

Career Opportunities →

Internships →

Media appearances and contributions by Gridware and our staff.

See More →



Whether you need us to take care of security for you, respond to incidents, or provide consulting advice, we help you stay protected.

View all services →

Web App Pen. Test Calculator →

Network Pen. Test Calculator →

Governance & Audit

Legal and regulatory protection

Penetration Testing

Uncover system vulnerabilities

Remote Working & Phishing

Fortify your defenses

Cyber Security Strategy

Adaptation to evolving threats

Cloud & Infrastructure

Secure cloud computing solutions

Gridware 360

End-to-end security suite

Gridware Managed Services

Comprehensive & proactive security

Gridware CloudControl

Harness the benefits of cloud technology

Gridware Incident Response 24/7

Swift, expert-led incident resolution



A collection of our published insights, whitepapers, customer success stories and more.

Customer success stories from real Gridware customers. Find out how we have helped others stay on top of their Cyber Security.

Read More →