2 Replies Latest reply on Mar 3, 2020 12:11 AM by SuRa_4645576

    WPA2-PSK security type PTK reinstallation in 4-way handshake using the same ANonce is succeeding when trying KRACKs

    SuRa_4645576

      WPA2-PSK security type PTK reinstallation in 4-way handshake using the same ANonce is succeeding when trying KRACKs. The understanding is for the WPA/WPA2-PSK the offloaded wpa_supplicant is doing the 4-way handshake with the Access Point. Could you please help us to understand how this 4-way hadhake is happening in the cypress chipset CYW4373. Why is the cypress chipset reconnecting with Access point when AP sends same ANonce message in the security vulnerability. Is there any setting we need to do to avoid key re-installation of same ANonce or Random ANonce in the chipset. In Linux OS it rejects same ANonce but in Vxworks It is accepting and reconnecting to AP.