Wi-Fi Protected Access II (WPA2) Handshake Vulnerabilities

Number: AL17-012
Date: 16 October 2017


The purpose of this alert is to bring attention to multiple critical vulnerabilities in WPA2, a protocol that secures all modern protected Wi-Fi networks.


CCIRC has become aware of multiple critical vulnerabilities in WPA2 handshake traffic. These vulnerabilities can be manipulated to induce nonce and session key reuse which could result in key reinstallation by a wireless access point or client. This could then enable arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast, broadcast, and multicast frames.

As these vulnerabilities are in the Wi-Fi standard, they are not related to individual products or their implementation. However, the correct implementation of the WPA2 protocol is likely affected.

The WPA2 protocol is affected by the following vulnerabilities:

Suggested action

CCIRC recommends that network administrators install updates to affected products as they become available and to consult the vendor for specific risk mitigation advice.



Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589
E-mail: ps.communications-communications.sp@canada.ca

Date modified: