Hi! Please sign in Home >  Support > Technical FAQs

Technical FAQs
Question Moxa Statement on Wi-Fi WPA2 Key Reinstallation Attacks (KRACKs) Security Vulnerability
Question Type Security Advisory
Updated 1/12/2018 3:50:39 PM
Hits 1
Products AWK-6222 Series,AWK-3121 Series,AWK-4121,V2406,AWK-5222 Series,AWK-3131 Series,AWK-4131 Series,AWK-5232 Series,AWK-6232 Series,AWK-1121 Series,MiiNePort W1 Series,AWK-1127 Series,UC-8481,NPort W2150A/NPort W2250A,AWK-3131-M12-RCC Series,AWK-3121-RTG Series,AWK-1131A Series,UC-8100 Series,V2616A Series,MAR-2000,AWK-3191 Series,TAP-6226 Series,AWK-5232-M12-RCC Series,V2416A Series,V2426A Series,WDR-3124A Series,AWK-3131A Series,EXPC-1519 Series,V2201 Series,MGate W5108/W5208 Series,ioLogik 2542-WL1,ioLogik 2512-WL1,V2403 Series,AWK-4131A Series,UC-8100-ME-T Series,UC-8410A Series,MC-1100 Series,AWK-1137C Series,TAP-213 Series,UC-8580 Series
Suggestions

Background

On October 16th 2017, security vulnerabilities were disclosed in WPA2 (Wi-Fi protected Access II), which made it possible for a user to eavesdrop on Wi-Fi traffic that utilized WPA2. An attacker within the wireless range of a Wi-Fi network can exploit these vulnerabilities using key reinstallation attacks (KRACKs).

Moxa's Cyber-Security Response Team (CSRT) is fully engaged in this matter and we are taking appropriate action. Our team has been working with all of our product teams to determine which models have been affected.

Affected Products and Solutions

  • The table below shows the list of models that have been affected and the release date of their patch firmware.
  • You can contact Moxa's technical support who will send it as soon as it is available.
  • Estimated official firmware release plan also updated in the table below.
  • For models that are already phased out, there will be no official firmware released on Moxa’s website. However, customers can still use the released patch firmware to fix KRACKs vulnerability.

Product Category Affected Product Model Series Patch Firmware Release Plan Official Firmware Release Plan
Industrial Wireless AWK-3131A
AWK-1131A
AWK-1137C
2017-Nov-3rd 2017-Dec-1st

AWK-3131-M12-RCC
AWK-1121
AWK-1127
2017-Nov-3rd N/A*
AWK-4131A
TAP-213-CT
AWK-3121-RTG
2017-Nov-8th 2017-Dec-1st
AWK-3121
AWK-3131
2017-Nov-8th N/A*
AWK-3191
TAP-6226
WDR-3124A
2017-Nov-10th 2017-Dec-1st
AWK-4121
AWK-4131-M12
AWK-5222
AWK-5232
AWK-5232-M12-RCCAWK-6222
AWK-6232-M12
2017-Nov-10th N/A*
Serial Device Severs NPort W2150A
NPort W2250A
NPort IAW5150A-6IO
NPort IAW5250A-6IO
2017-Nov-3rd 2017-Dec-1st
MiiNePort W1 2017-Dec-29th
Industrial Ethernet Gateways MGate W5108
MGate W5208
2017-Nov-3rd 2017-Dec-15th
Smart Remote I/O ioLogik 2512-WL1-EU/JP/US
ioLogik 2542-WL1-EU/JP/US
2017-Nov-21st 2017-Dec-26th

Product Category Affected Product Model Series Patch SOP Procedure
Industrial Computing V2201 series
V2403 series
V2406 series
V2416A series
V2426A series
V2616A series
MC-1100 series
EXPC-1519 series
UC-8100 series
UC-8100-ME-T series
UC-8410A series
UC-8580 series
UC-8481 series
MAR-2000 series
2017-Oct-31 st
for SOP to update the fixed patch

W341
W321

Phased out by 2017 Oct.
Patch SOP will be provided when requested

Related Questions
Provide Feedback
Quality of this article
Poor                Excellent