Meraki APs and the AirSnitch vulnerability?

Cryptopher
Conversationalist

Meraki APs and the AirSnitch vulnerability?

Are Cisco Meraki Wi-Fi access points vulnerable to the recent AirSnitch vulnerability? Can Meraki's Air Marshal feature help mitigate AirSnitch?

3 Replies 3
Tony-Sydney-AU
Meraki Employee All-Star Meraki Employee All-Star
Meraki Employee All-Star

Hello @Cryptopher ,

 

Thanks for bringing this recently found vulnerability.

 

As you know, Cisco take security very seriously and as such, our Internal Teams are working on it.

 

We'll update our community soon.

 

In the meantime, just keep an eye on Cisco Security Advisories and filter by Meraki product family. This still is one of the best ways to be informed and updated.

 

If you found this post helpful, please give it kudos. If my answer solved your problem, click "accept as solution" so that others can benefit from it.
AlexanderN
Meraki Employee All-Star Meraki Employee All-Star
Meraki Employee All-Star

Cisco is actively preparing a response to the whitepaper, "AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks." We anticipate sharing our response within the next week.

 

At this time, there is no security advisory planned because AirSnitch does not represent a protocol-level vulnerability, such as KRACK or Dragonblood. Additionally, the referenced paper does not introduce new or original findings. This research indicates that the attack leverages fundamental Wi-Fi architectural behaviors that have been part of the standard for a considerable period.

 

Customers that already adhere to ZTA principals would not be affected.

RaphaelL
Kind of a big deal
Kind of a big deal

100% subscribing to this thread.

This is going to land on my desk in a moment I'm pretty sure.

Get notified when there are additional replies to this discussion.