These are the router makers that have patched KRACK WPA2 Wi-Fi flaws

Vendors who have patched the KRACK WPA2 Wi-Fi vulnerability

An exploit that has taken the "protected" out of Wi-Fi Protected Access II (WPA2) means that your wireless network is likely not as safe as you once thought. What security researcher Mathy Vanhoef is calling "KRACK" attacks the handshake portion of the WPA2 protocol. Mobile Nations Senior Editor Jerry Hildenbrand put together a comprehensive guide on exactly how the exploit works and how you can protect yourself, also mentioning some information on patches containing a fix. To help you stay on top of which vendors are patching the vulnerability, we rounded them up here.

Router vendors that have issued KRACK patches

As mentioned in Hildenbrand's article, the best way to protect yourself from this exploit is to not use Wi-Fi at all until a proper fix has been proven. CERT has released notes on the KRACK problem, including a list of vendors whose equipment is vulnerable.

Some security-minded companies have already worked on fixes and are offering patches for both client and router. Check back often, as we will keep this list updated.

There are also a number of vendors listed as "Not affected" on the CERT website without further explanation from the vendors themselves. These include:

Furthermore, some companies have posted bulletins regarding their products that weren't affected.

Last updated: October 20, 2017, 12:21 pm EDT

Cale Hunt is a staff writer at Mobile Nations. He focuses mainly on PC, laptop, and accessory coverage, as well as the emerging world of VR. He is an avid PC gamer and multi-platform user, and spends most of his time either tinkering with or writing about tech.

  • Any word on when AirPorts will be patched?
  • Patching routers has almost no result. This is a client exploit, not an access point exploit. The patches being applied are only to cover routers used as wireless clients themselves.
  • According to this article here the Apple Routers do not need to be fixed (although it does not go into any detail as to why):
  • This is what I figure: You can read traffic being sent and exploits may be applicable to routers if the TK protocol is being used.
  • Meraki APs have been patched as well...and they show you can just turn off the affected "802.11r" protocol. THIS is where the exploit resides. It has to do with "fast transition" roaming between access points. If you don't have a patch, see if you can turn off the "FT".
  • Amplifi HD routers have a patch now, v 2.4.3. You might have to check from the app to force it (it wasn't showing on the device screen). Ref:
  • tp-link have an article up on their site, indicating that the following products are unaffected:
    All powerline adapters
    All mobile Wi-Fi products
    Routers and gateways working in their default mode (Router Mode) and AP Mode
    Range extenders working in AP Mode
    Business Wi-Fi EAP series access points working on AP mode
    and more details on products possibly affected.
  • tp-link link:
  • Glad to see Synology patch in a decent time frame. I am interested in there products as Apple is getting out of the router biz… sadly.