Site Status
If you see this message. The move to a new host has completed
Most Recent Posts
AC Billing Software
by OfficeMgr88 - 11/28/2024 12:36 PM
Problems logging in - Hard reset at AC needed.
by OfficeMgr88 - 11/28/2024 12:30 PM
Banning AIWEBDEVELOPMENTS.CO
M

by Ruben - 11/22/2024 1:39 PM
MAINE PEDIATRICIAN
by Bert - 11/22/2024 10:58 AM
TO THE DEVELOPERS
by ChrisFNP - 11/20/2024 12:01 PM
How to edit diagnosis codes
by ChrisFNP - 11/12/2024 5:41 PM
More difficult to prescribe these days
by Tomastoria - 11/12/2024 12:15 PM
Total Deleted Items Record
by Bert - 11/07/2024 8:17 AM
Member Spotlight
ryanjo
ryanjo
Central Florida
Posts: 2,084
Joined: November 2006
Newest Members
girlfromwebpage, thomastommy12312, Dr M @ EmmFamPr, Stella, BritbikeMorgan
4,588 Registered Users
Previous Thread
Next Thread
Print Thread
Rate Thread
Joined: Jun 2009
Posts: 1,811
Indy Offline OP
Member
OP Offline
Member
Joined: Jun 2009
Posts: 1,811
The bottomline here is that unless you KNOW a device has been successfully patched, it can be breached, and I expect that crafted attacks will be in the wild soon.

The links and an excellent article that details the technical analysis is below.

What to do:
<>Patch your WIFI as soon as there is a patch
<>Consider taking down your WIFI until there is a patch
<>Assume that ANYTHING you send over your phone in high traffic areas (Airports, hotels, restaurants, etc) is being gathered.
<>Time to SERIOUSLY consider VPN access for your phone and/or private key hotspots.

This will get prompt attention from some vendors, but going forward, don't trust a device that you don't KNOW is successfully patched.

Excellent detailed analysis


Source news


Additional article that points out ...ings - appliances, wireless cameras, etc


Indy
"Boss"

Indy's Blog

www.BestForYourPractice.com
Our Name is Our Creed
Joined: Mar 2014
Posts: 120
Likes: 4
Member
Offline
Member
Joined: Mar 2014
Posts: 120
Likes: 4
So, what does this mean for our office wifi networks that we use for Amazing Charts? And thanks for posting!


Jack
Joined: Jun 2009
Posts: 1,811
Indy Offline OP
Member
OP Offline
Member
Joined: Jun 2009
Posts: 1,811
Originally Posted by Headcase
So, what does this mean for our office wifi networks that we use for Amazing Charts? And thanks for posting!

Realistically, criminals are lazy, and are much more prone to attack busy target areas. There is a whole story about how they attack departing International flight passengers, but that is just an example.

Once there are examples, any low rent hacker will use it because it is like the "Master Key" in movies, except real.

I'm hoping that vendors step up and patch this quickly, but none of us control that, and it is an issue in the actual standard [makes you wonder ....] and how it is implemented.

Short term, the safe bet is get network drops put in where you need them, and get the speed benefit of going wired.

There are more complex solutions, but turning off WIFI is the safe, if inconvenient bet.

Time to consider a VPN on your phone, either to your office, or to a hosted environment.

The technology world globally just that much more dangerous today.


Indy
"Boss"

Indy's Blog

www.BestForYourPractice.com
Our Name is Our Creed
Joined: Jan 2005
Posts: 442
Member
Offline
Member
Joined: Jan 2005
Posts: 442
Indy,
Thanks for the post and links.
So from what I am reading, even if the router is patched with the WPA2 KRACK update, if other devices connected via WPA2 remain corrected to the network and are unpatched, then the network is not secure. Is that correct?


...KenP
Internist (retired 2020)
Florida
Joined: Jun 2009
Posts: 1,811
Indy Offline OP
Member
OP Offline
Member
Joined: Jun 2009
Posts: 1,811
Here is the Csco confirmation that there a long list of vulnerable devices.

Some Vendors are already releasing patches.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa


Indy
"Boss"

Indy's Blog

www.BestForYourPractice.com
Our Name is Our Creed
Joined: Jun 2009
Posts: 1,811
Indy Offline OP
Member
OP Offline
Member
Joined: Jun 2009
Posts: 1,811
Originally Posted by KenP
Indy,
Thanks for the post and links.
So from what I am reading, even if the router is patched with the WPA2 KRACK update, if other devices connected via WPA2 remain corrected to the network and are unpatched, then the network is not secure. Is that correct?

From an attack surface perspective, securing the access point is the key.

If you have devices that aren't patched, then they are a risk in attaching to compromised networks, and then exposing banking credentials, patient data, etc.

Longer term, Docs need to implement VPNs to secure their network usage. Especially when traveling.


Indy
"Boss"

Indy's Blog

www.BestForYourPractice.com
Our Name is Our Creed
Joined: Apr 2011
Posts: 2,316
Likes: 2
G
Member
Offline
G
Member
Joined: Apr 2011
Posts: 2,316
Likes: 2
Just to add to the story:

Bleeping computer has list of manufacturers who have released patched firmware:
https://www.bleepingcomputer.com/ne...er-updates-for-krack-wpa2-vulnerability/

Our 2 Main vendors Mikrotik and Ubiquiti have already released patches. Lots of people use the Combo Modem/Router/AP's from their ISP. Those take forever to get updates.


Moderated by  ChrisFNP, DocGene, JBS, Wendell365 

Link Copied to Clipboard
ShoutChat
Comment Guidelines: Do post respectful and insightful comments. Don't flame, hate, spam.
Who's Online Now
1 members (OfficeMgr88), 20 guests, and 16 robots.
Key: Admin, Global Mod, Mod
Top Posters(30 Days)
Bert 15
serene 3
JBS 3
beagle 2
Ruben 2
Top Posters
Bert 12,849
JBS 2,973
Wendell365 2,362
Sandeep 2,316
ryanjo 2,084
Leslie 2,002
Wayne 1,889
This board is dedicated to the memory of Michael "Indy" Astleford. February 6, 1961 -- April 16, 2019




SiteLock
Powered by UBB.threads™ PHP Forum Software 7.7.5