• Home Support Forums Security Advisories Shop     English | French
Support Announcement
KrØØk :: CVE-2019-15126 :: Industry-wide vulnerability affected encryption of billion+ Wi‑Fi devices

Overview

 

ESET researchers recently reported that an industry-wide vulnerability named KrØØk could potentially affect devices with Broadcom Wi-Fi chips. D-Link is currently investigating the issue with Broadcom to understand the potential impact on D-Link devices. Meanwhile, we strongly advise D-Link device owners use encrypted connection methods such as HTTPS, SSH, or POP3S to minimize their risk of being hacked. We will provide updates as soon as we have more information.

 

 

An issue was discovered on Broadcom Wi-Fi client devices. Precisely timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.

 

 D-Link takes the issues of network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures. Please check the D-Link website for updates regularly.

 

Disclosure

 

The vulnerability affects both WPA2-Personal and WPA2-Enterprise protocols, with AES-CCMP encryption.

 

 

           NVD: https://nvd.nist.gov/vuln/detail/CVE-2019-15126

           CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15126

 

 

Affected Models

 

Model Hardware Revision Affected FW Fixed FW Recommendation  Last Updated
DIR-868L All Ax Hardware Revisions v1.20b01 & Below  v1.21b01_Beta Please Download and Upgrade 04/28/2020
DIR-880L All Ax Hardware Revisions v1.20b02Beta & Below

v1.21b01_Beta

Please Download and Upgrade 05/19/2020
DIR-890L All Ax Hardware Revisions v1.21b02Beta & below v1.22b01_Beta Please Download and Upgrade 06/12/2020
DWL-2600AP All Ax Hardware Revisions v4.2.0.17 & Below v4.2.0.17B002C Please Download and Upgrade 04/16/2020
DWL-3600AP All Ax Hardware Revisions v4.2.0.15 & Below v4.2.0.15B003C Please Download and Upgrade 04/16/2020
DWL-3610AP All Ax Hardware Revisions v4.6.2.0 & Below v4.6.2.1_Hotfix Please Download and Upgrade 04/28/2020
DWL-6600AP All Ax Hardware Revisions v4.2.0.15 & Below v4.2.0.15B003C Please Download and Upgrade

04/16/2020

DWL-6610AP All Ax Hardware Revisions v4.3.0.8 & Below v4.3.0.8B003C Please Download and Upgrade

04/23/2020

DWL-6610AP All Bx Hardware Revisions v4.6.2.0 & Below  v4.6.2.1_Hotfix Please Download and Upgrade 04/28/2020
DWL-8600AP All Ax Hardware Revisions v4.3.0.2 & Below

v4.3.0.2B018C

Please Download and Upgrade

04/23/2020

DWL-8610AP All Ax Hardware Revisions v4.3.0.10 & Below v4.3.0.10B022C Please Download and Upgrade 04/23/2020
DWL-8710AP All Ax Hardware Revisions v4.5.0.1 & Below v4.5.0.8b009C Please Download and Upgrade 04/23/2020

  

Regarding Security patch for your D-Link Devices

 

Firmware updates address the security vulnerabilities in affected D-Link devices. D-Link will update this continually, and we strongly recommend all users to install the relevant updates.

 

Please note that this is a device beta software, beta firmware, or hot-fix release, which is still undergoing final testing before its official release. The beta software, beta firmware, or hot-fix is provided on an “as is” and “as available” basis, and the user assumes all risk and liability for use thereof. D-Link does not offer any warranties, whether express or implied, as to the suitability or usability of the beta firmware. D-Link will not be liable for any loss, whether such loss is direct, indirect, special or consequential, suffered by any party as a result of their use of the beta firmware.

 

As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.