We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest! Update Here
Stay in the loop with the latest from Microchip! Update your profile while you are at it. Update Here
Complete your profile to access more resources.Update Here!

Wi-Fi® Protected Access II (WPA2) Vulnerabilities (VU#228519)

Recent studies have shown that the WPA2 (Wi-Fi® Protected Access II) protocol, which is a widely used Wi-Fi security mechanism, is vulnerable to a Key Reinstallation attack (KRACK). This vulnerability is in the standard definition and not in a specific implementation.

Microchip is committed to providing secure and robust solutions and as such, we are making continuous effort to follow latest industry practices and recommendations.

Affected Products and Resolution


Product Notes Resolution
WILC1000/WILC3000 The WILC1000/WILC3000 firmware doesn’t implement any part of the WPA2 handshake or protocol The vulnerabilities specific to the WPA2 protocol which is implemented on the Linux® Host WPA Supplicant. We highly encourage our customers to identify the needed patches for WPA Supplicant.
WINC1500/WINC1510 WINC1500 and WINC1510 firmware version 19.5.4 and beyond include the WPA2/KRACK fix Update the firmware to version 19.5.4 or later: WINC1500 or WINC1510
RN171/RN131 New updated firmware with KRACK fixes is available on product pages Update firmware: RN171 or RN131
RN1723 New updated firmware with KRACK fixes is available on product pages Update firmware: RN1723
RN1810 Affected None available
MRF24Wx0MA/MB Affected Order parts with the latest firmware:

MRF24WG0MA-I/RM110

MRF24WG0MB-I/RM110

MRF24WG0MBT-I/RM110

Potential Impact


An attacker within range of an affected access point (AP) and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames.

Detailed information about these vulnerabilities can be found here:

  • CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake
  • CVE-2017-13078: reinstallation of the group key in the Four-way handshake
  • CVE-2017-13079: reinstallation of the integrity group key in the Four-way handshake
  • CVE-2017-13080: reinstallation of the group key in the Group Key handshake
  • CVE-2017-13081: reinstallation of the integrity group key in the Group Key handshake
  • CVE-2017-13082: accepting a retransmitted Fast BSS Transition Re-association Request and reinstalling the pairwise key while processing it
  • CVE-2017-13084: reinstallation of the STK key in the Peer-Key handshake 
  • CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer-Key (TPK) key in the TDLS handshake
  • CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
  • CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame

Reference Documentation