Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Will eir patch D1000 modem for WPA2 KRACK vulnerability?

  • 16-10-2017 10:11pm
    #1
    Registered Users, Registered Users 2 Posts: 42


    Wondering whether eir can comment on their current activity and plans to provide customers with a patch to secure their provided D1000 modem.


Comments

  • Closed Accounts Posts: 1,508 ✭✭✭eir: Adam


    jaydev wrote: »
    Wondering whether eir can comment on their current activity and plans to provide customers with a patch to secure their provided D1000 modem.
    Hi jaydev,

    Thanks for getting in touch. At this time we don't have any information on any changes being made to the settings on our modems. If we release any information on changes that you need to make to your modem, you will be notified.

    - Adam


  • Registered Users, Registered Users 2 Posts: 661 ✭✭✭babelfish1990


    jaydev wrote: »
    Wondering whether eir can comment on their current activity and plans to provide customers with a patch to secure their provided D1000 modem.
    The Krack vulnerability can't be exploited on typical residential spec routers used by most ISPs such as Eir.  Typical routers that might be vulnerable are high-end devices with Mesh WiFi/802.11r such as might be used in Campus or Enterprise WiFi.  Since you have to be on-premises or near-premises to do this WiFI exploit, you would probably within range of the security cameras in most campus or enterprise deployment before you could carry out this exploit.  Most business users will have their data well encrypted or in a VPN.  While it may be a theoretical risk, there is no evidence of anyone actually having their data compromised by this.  I would also expect the manufacturers to release security patches quickly.  This exploit seems to have been a bit over-hyped, to be honest, probably by people tying to make a name for themselves or selling consultancy.   There are bigger risks out there on the Internet.  


Advertisement