Network Perimeter Security – KRACK Patch Deployed by Microsoft

I received a question from a viewer from my Anet Computers YouTube channel. They asked if Knowledge Base 4041681 for Windows 7 service pack one, patched the Key Reinstallation AttaCKs security vulnerability. The short answer is yes.

“is this KB4041681 patch the one which addresses the WPA2 vulnerability (KRACK susceptibility)??”


The longer answer follows below this sentence. A new wireless security vulnerability was discovered by Mathy Vanhoef. He named this network perimeter security risk KRACK or Key Reinstallation AttaCKs. This deals with WiFi Protected Access version two also known as WPA2.

Mathy found a vulnerability in this wireless standard not necessarily just certain original equipment manufacturer’s creations. Potentially, you could have sensitive data stolen from you. Even though you thought your data was safely encrypted.

* credit card numbers
* passwords
* chat messages
* emails
* photos

The root cause analysis perhaps is technically convoluted and complex but basically any attacker within distance of a networking device that uses WPA2 could potentially circumvent network perimeter security. Adding insult to injury a perpetrator could install malware or ransomware onto a device. Google Android, Linux, Apple Macintosh, Microsoft Windows, and OpenBSD operating systems were vulnerable according to Mathy’s analysis.

Popular networking equipment manufacturer’s like MediaTek and Lynksis has vulnerable products. Any networking device using WPA2 is susceptible until patched. Microsoft released a patch for this vulnerability around six days after this network perimeter security vulnerability was discovered.

A patch for all versions of Windows 7, 8, 8.1, and 10 were released. Also, patches were released for Windows Server 2008, 2012, and 2016. Windows XP and Vista are not supported any longer, except for enterprise customers.

According to some individuals in the technology spectrum, it could take decades to patch all devices that use Wifi Protected Access version two. You are talking about routers, switches, access points, etc. that use this protocal. Some devices may not be able to get patched.

Operating systems like Windows XP and Vista may remain patchless. I’m not fearmongering just pointing out reality.