Wpa2 wi fi krack vulnerability – Breaking News & Latest Updates 2026
Skip to main content

Wi-Fi security has been breached, say researchers

This is your Wi-Fi on KRACK

This is your Wi-Fi on KRACK

Illustration by Alex Castro / The Verge
Thomas Ricker
is a deputy editor and Verge co-founder with a passion for human-centric cities, e-bikes, and life as a digital nomad. He’s been a tech journalist for 20 years.

At about 7AM ET this morning, researchers revealed details of a new exploit called KRACK that takes advantage of vulnerabilities in Wi-Fi security to let attackers eavesdrop on traffic between computers and wireless access points. The exploit, as first reported by Ars Technica, takes advantage of several key management vulnerabilities in the WPA2 security protocol, the popular authentication scheme used to protect personal and enterprise Wi-Fi networks. “If your device supports Wi-Fi, it is most likely affected,” say researchers.

So yeah, this is bad.

The United States Computer Emergency Readiness Team issued the following warning in response to the exploit:

US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.

The researchers noted that 41 percent of all Android devices are vulnerable to an “exceptionally devastating” variant of the Wi-Fi attack. All Wi-Fi devices are to some degree susceptible to the vulnerabilities making them ripe for data theft or ransomware code injection from any malicious attacker within range. The researchers recommend patching all Wi-Fi clients and access points when the fixes are available and to continue using WPA2 until then (WPA1 is also affected and WEP security is even worse). It’s not yet clear if the vulnerabilities revealed today are actively being exploited in the wild.

You can read more about the exploit at krackattacks.com, before the vulnerabilities are formally presented on November 1st in a talk titled “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2” at a security conference in Dallas.

Update October 16th, 6:17AM ET: Article updated with information from krackattacks.com.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.