Hi,
I would like to know if Meraki has some taken any steps to mitigate this vulnerability.
We are:
- using WPA2 encryption and not WPA3
- using RADIUS authentication
I hope Meraki will release a patch to mitigate the vulnerability. Does anyone know or shed some light on the steps that Meraki is going to take or is advising the customers ?
What vulnerability? Do you have the CVE?
This CVE is from 2023, Meraki has probably already released the fix some time ago, as they frequently release new updates.
Have you already contacted support?
Doubt that Meraki has published a fix for that. The CVE was published this month.
Without knowing exactly what the underlying mechanisms is in this specific CVE, from what I'm reading about it, it's simply an overall design flaw in the 802.11 standard.
It's always been there, and will always be there.
Basically it aims at tricking a user to associate to your malicious and less secure SSID (a honeypot) and eavesdrop on all your traffic.
If you really want to mitigate it, there's an easy fix.
Turn of all your WiFi and Access Points, and cable your devices to the network.
It's a day old I doubt any vendor has patched it as it's still being analysed.
There is no public bug or PSIRT for this vulnerability yet, given it's still pretty fresh.
Raise a support ticket for more information as they may already be investigating internally.
Hi @gagan239,
NOTE: I DO NOT KNOW, THE FULL INS AND OUTS OF THIS VULNERABILITY.
That said, Meraki Air Marshal does have some level of mitigation from Rouge SSIDs. See below guide for further details.
https://documentation.meraki.com/MR/Monitoring_and_Reporting/Air_Marshal
Original writeup came out a few weeks ago: https://www.top10vpn.com/research/wifi-vulnerability-ssid/
I wouldn't expect a fix to be released quickly, if at all!