Indoor Product Model | CenOS | Version | |
DT-300N | 3.0 | v1.1.12 | Download |
5.0 | v1.0.5 | Download | |
100GX-N | 3.0 | v1.0.21 | Download |
5.0 | v0.0.4 | Download | |
DT-100G-N | 3.0 | v1.0.26 | Download |
WP-300N | 3.0 | v1.0.4 | Download |
5.0 | v1.0.5 | Download | |
CW-400NAC A1 | 5.0 | V1.1.10 | Download |
CW-400NAC A2 | 5.0 | V1.1.10 | Download |
Outdoor Product Model | CenOS | version | |
OW-200 | 3.0 | v2.0.10 | Download |
215N2-X | 3.0 | v2.0.10 | Download |
OW-300N2-A2 | 3.0 | v1.1.12 | Download |
5.0 | v1.0.5 | Download | |
OW-400 A2 | 5.0 | V1.1.10 | Download |
An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.
Krackattacks official website said, The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected. During our initial research, we discovered ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks.
Therefore, if a user using the Cerio’s product and used client mode will also encounter this problem, AP mode will not be affected. Our RD team has solved this problem, please update new firmware will be can prevent WPA2 loopholes.