Support Announcements
Hashcat Developers Discover New Security Flaw in WPA/WPA2 WiFi Encryption

Overview

 

On August 4, 2018, a disclosure by a Hashcat developer was posted describing new technique to exploit WPA PSK (Pre-Shared Key) passwords. (LINK HERE)

 

D-Link is aware and investigating the potential threat to our customers, our products, and our systems. 

 

Regarding this disclosure:

 

     - This is seperate and independ of the WPA2 exploit known as the KRACK vulnerability

     - This exploit requires IEEE 802.11i, IEEE 802.11p,  IEEE 802.11r used for WiFi Device "roaming" between WiFi access points to be enabled.

     - Many D-Link consumer routers do not have these roaming features enabled

 

Please frequently check back on this announcment as information comes available.