The WPA2 protocol vulnerability seems to be fixed in Apple products

Yesterday afternoon the news about a vulnerability found in the WPA2 protocol of all WiFi connections reached the network. In this way security expert Mathy Vanhoef, he has been in charge of making this news public, which really affects all users.

And is that you have a Mac, a PC, an iPhone, an iPad, a modem, an Android device, a router or any other device that uses this security protocol WPA2 is vulnerable to the security flaw found. In this sense, clarify that the security failure is not alarming since physical access to the equipment in question is needed, but it's important to fix the problem and it seems that Apple already has.

Many of us may wonder if it is so easy to solve a problem of such magnitude, since it is not a failure of a specific operating system or similar, and the answer to this question is yes. Simply with a remote firmware update it is possible to solve or cover the reported security hole and Apple has already done this for all of its products that use this security protocol.

We can read in AppleInsider that the bug was already fixed in the previous betas of macOS, iOS, tvOS and watchOS, pbut nothing is said about the AirPort Extreme, AirPort Express and Time Machine. In these Apple routers there is the problem that they are discontinued so you have to be careful if Apple decides in the end to launch the new firmware with the patch on all of them or not. In case of not receiving the firmware, nothing would happen either since our Mac, iPhone, etc. do have this protection, so calm down.


Buy a domain
You are interested in:
The secrets to launching your website successfully

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.