vanhoefm/krackattacks

Applicability / Mitigation Matrix Request

Closed this issue · 2 comments

First, thank you for your contributions to information security.

Many organizations are trying to understand how to fully mitigate this vulnerability. It is very clear that there is an inherent issue with the 4-way handshake as defined in the standard. However, it is unclear how this can be effectively mitigated. Obviously, patching ALL supplicants and authenticators will address the issue. But, it would be very helpful to understand where organizations can focus their efforts for best risk reduction.

From the paper, it appears that the wireless controllers can effectively prevent the client from using old replay counter. But, it is not clear (for those of us less familiar with the nuances of this technology) to understand exactly what is vulnerable and where the issue can be mitigated.

I think something like the below table would provide an incredible value to organizations (IT/Security Teams), helping us understand the risk and prioritize efforts. The table is meant to answer the question: "Which CVEs require me to patch just my authenticators to protect my network? Which ones require both?"

Some example values are filled in for each CVE to show what I was thinking.

CVE Vulnerable Component Patch Needed
CVE-2017-13077 Both Supplicant
CVE-2017-13078 Supplicant Either
CVE-2017-13079 Authenticator Both
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088

This would be a boon for the community.
From my current understanding, most of the burden is placed on the side of the client.

It seems like some information has landed in this commit: 4d757c3