{"id":9916,"date":"2017-10-16T12:30:09","date_gmt":"2017-10-16T20:30:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/16\/news-3689\/"},"modified":"2017-10-16T12:30:09","modified_gmt":"2017-10-16T20:30:09","slug":"news-3689","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/16\/news-3689\/","title":{"rendered":"Microsoft shuts down Krank with emergency Windows update"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Mon, 16 Oct 2017 12:20:00 -0700<\/strong><\/p>\n<p>Microsoft today issued an emergency Windows security update to patch vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol used to secure wireless networks.<\/p>\n<p>Details of the security update were published to Microsoft&#8217;s Security Update Guide, the catalog-like portal that <a href=\"https:\/\/www.computerworld.com\/article\/3189686\/windows-pcs\/microsoft-kills-off-security-bulletins-after-several-stays.html\">earlier this year<\/a> replaced the decades-old practice of delivering explanatory bulletins.<\/p>\n<p>All supported versions of Windows will receive the update, according to the <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-13080\" target=\"_blank\" rel=\"nofollow\">catalog listing<\/a>, including Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012 and Windows Server 2016.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3233290\/security\/krack-researcher-discovers-flaws-in-wpa2-authentication.html\" target=\"_blank\">The vulnerabilities were revealed<\/a> by Mathy Vanhoef, a researcher at Katholieke Universiteit Leuven in Belgium. On a <a href=\"https:\/\/www.krackattacks.com\" target=\"_blank\" rel=\"nofollow\">website that went live Monday<\/a>, Vanhoef said that weaknesses in WPA2 allow criminals to read information transmitted over a Wi-Fi network thought to be encrypted by the protocol.<\/p>\n<p>&#8220;Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted,&#8221; Vanhoef wrote on the website. &#8220;This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on.&#8221;<\/p>\n<p>Vanhoef dubbed the attack &#8220;Krank,&#8221; for &#8220;Key Reinstallation Attacks.&#8221;<\/p>\n<p>Although Microsoft released its October slate of security updates last Tuesday, it held today&#8217;s patches because news of Krank was scheduled to be issued this morning by Vanhoef, numerous security organizations and multiple vendors. &#8220;In partnership with the International Consortium for Advancement of Cybersecurity on the Internet (ICASI), Microsoft participated in a multi-vendor coordinated disclosure to acknowledge and describe several Wi-Fi Protected Access (WPA) vulnerabilities,&#8221; Microsoft said in its update description.<\/p>\n<p>The Windows security update patches the client and server flavors of Microsoft&#8217;s OS, but even then, users may be at risk, the company warned. &#8220;When affected Windows-based systems enter a connected standby mode in low-power situations, the vulnerable functionality may be offloaded to installed Wi-Fi hardware,&#8221; Microsoft said. &#8220;To fully address potential vulnerabilities, you are also encouraged to contact your Wi-Fi hardware vendor to obtain updated device drivers.&#8221;<\/p>\n<p>Windows PCs with Automatic Updates enabled will probably receive the patches later today, most likely overnight. Managed devices must receive the green light from IT personnel.<\/p>\n<p>Vanhoef and Frank Piessens, another security researcher at Katholieke Universiteit Leuven, will present a paper on Krank Nov. 1 at a conference in Dallas, Texas. The <a href=\"https:\/\/papers.mathyvanhoef.com\/ccs2017.pdf\" target=\"_blank\" rel=\"nofollow\">paper can be found here<\/a>.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3233198\/microsoft-windows\/microsoft-shuts-down-krank-with-emergency-windows-update.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Mon, 16 Oct 2017 12:20:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Microsoft today issued an emergency Windows security update to patch vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol used to secure wireless networks.<\/p>\n<p>Details of the security update were published to Microsoft&#8217;s Security Update Guide, the catalog-like portal that <a href=\"https:\/\/www.computerworld.com\/article\/3189686\/windows-pcs\/microsoft-kills-off-security-bulletins-after-several-stays.html\">earlier this year<\/a> replaced the decades-old practice of delivering explanatory bulletins.<\/p>\n<p>All supported versions of Windows will receive the update, according to the <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-13080\" target=\"_blank\" rel=\"nofollow\">catalog listing<\/a>, including Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012 and Windows Server 2016.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3233198\/microsoft-windows\/microsoft-shuts-down-krank-with-emergency-windows-update.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-9916","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9916"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9916\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9916"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}