<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Kr00k - Broadcom/Cypress WiFi Chip Vulnerability in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Kr00k-Broadcom-Cypress-WiFi-Chip-Vulnerability/m-p/33297#M2407</link>
    <description>&lt;P&gt;Happy Monday!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CVE-2019-15126 or more affectionately "Krook" is a vulnerability in Broadcom and Cypress Wi-Fi chips that allows unauthorized decryption of some WPA2-encrypted traffic. These are the most common Wi-Fi chips used by well-known manufacturers including Amazon (Echo, Kindle), Apple (iPhone, iPad, MacBook), Google (Nexus), Samsung (Galaxy).&amp;nbsp;Wi-Fi Access points and routers are also affected by Kr00k, making even environments with patched client devices vulnerable. All-in-all, before patching there were more than a billion affected devices.&amp;nbsp;What is the state of patching of Kr00k for iOS, MacOS, Cisco, and Huawei &lt;IMG id="smileywink" class="emoticon emoticon-smileywink" src="https://community.isc2.org/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt; devices? Check &lt;A href="https://www.eset.com/int/kr00k/" target="_blank" rel="noopener"&gt;here&lt;/A&gt;. For more info watch the RSA Conference presentation &lt;A href="https://www.rsaconference.com/usa/agenda/kr00k-how-kracking-amazon-echo-exposed-a-billion-vulnerable-wifi-devices" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:27:25 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:27:25Z</dc:date>
    <item>
      <title>Kr00k - Broadcom/Cypress WiFi Chip Vulnerability</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kr00k-Broadcom-Cypress-WiFi-Chip-Vulnerability/m-p/33297#M2407</link>
      <description>&lt;P&gt;Happy Monday!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CVE-2019-15126 or more affectionately "Krook" is a vulnerability in Broadcom and Cypress Wi-Fi chips that allows unauthorized decryption of some WPA2-encrypted traffic. These are the most common Wi-Fi chips used by well-known manufacturers including Amazon (Echo, Kindle), Apple (iPhone, iPad, MacBook), Google (Nexus), Samsung (Galaxy).&amp;nbsp;Wi-Fi Access points and routers are also affected by Kr00k, making even environments with patched client devices vulnerable. All-in-all, before patching there were more than a billion affected devices.&amp;nbsp;What is the state of patching of Kr00k for iOS, MacOS, Cisco, and Huawei &lt;IMG id="smileywink" class="emoticon emoticon-smileywink" src="https://community.isc2.org/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt; devices? Check &lt;A href="https://www.eset.com/int/kr00k/" target="_blank" rel="noopener"&gt;here&lt;/A&gt;. For more info watch the RSA Conference presentation &lt;A href="https://www.rsaconference.com/usa/agenda/kr00k-how-kracking-amazon-echo-exposed-a-billion-vulnerable-wifi-devices" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:27:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kr00k-Broadcom-Cypress-WiFi-Chip-Vulnerability/m-p/33297#M2407</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:27:25Z</dc:date>
    </item>
  </channel>
</rss>

