On October 16, 2017, a research paper with the title of "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2" was published. This paper descibes potential interception ways for Wireless LAN connections which are secured with WPA2 encryption. It is important to note that these are weaknesses of the WiFi standard itself, automatically affecting all products and applications they are used with. While the described WPA2 flaws are hypothetical in many ways, Viprinet takes the situation serious and is currently working on security updates for all Wireless LAN AccessPoints or Wireless LAN clients which could be affected.
This update will be included in our upcoming stable firmware release, which is scheduled for release end of October. Viprinet highly recommends updating to this firmware as soon as possible and will announce the release via different communication platforms. Viprinet also recommends checking for related updates for client devices to ensure that customers and users are protected, regardless of the access point vendor or patch level they are using.