Important Notice about Products
About WPA2 Vulnerability (KRACKs)
It has been reported that a newly discovered vulnerability known as “KRACKs (Key Reinstallation AttaCKs)” affects the wireless security protocol WPA2.
The effects on our products and our response are as described below.
Affected Products
TR-71wf/72wf (including -H and -S types), TR-75wf
RTR-500AW
TR-701AW/702AW (including -H type)
Potential Impact
The biggest risk can be loss or falsification of data, such as measurement data, sent by the affected products. However, there is no concern about the risk of someone stealing your wireless LAN password or illegally accessing the internal network with this vulnerability.
* The firmware (a core part of the device) cannot be rewritten through unauthorized access.
* Even if the data destination setting is changed by the attack and the affected product(s) send data to an incorrect IP address in the internal network, the transmission interval will remain within the setting range, therefore attacks such as a DoS attack will not occur.
T&D Response
October 25, 2017
We’re currently discussing a firmware update for the affected products.
We’ll continue to update this page with the latest information.
Update on Nov.2
TR-71wf/72wf/72wf-H/72wf-S/75wf : Research completed; firmware update to be released soon
RTR-500AW : Under Research
TR-701AW/702AW/702AW-H : Under Research
Update on Nov.30
RTR-500AW : Research completed; firmware update to be released soon.
This update will be supported on the RTR-500AW products that have a serial number with the last four digits 1000 or greater.
Please note that other RTR-500AW (with the last four digits less than 1000) will not be supported.
Update on Dec.7
TR-701AW/702AW/702AW-H : Research completed; firmware update to be released soon.
This update will be supported on the TR-701AW/702AW/702AW-H products that have a serial number with the last four digits 1000 or greater.
Please note that other TR-701AW/702AW/702AW-H (with the last four digits less than 1000) will not be supported.
Update on Dec.19
TR-71wf/72wf/72wf-H/72wf-S/75wf : Research completed; firmware update to be released soon.
RTR-500AW, TR-701AW/702AW/702AW-H: firmware update to be released.
This update will be supported on the RTR-500AW, TR-701AW/702AW/702AW-H products that have a serial number with the last four digits 1000 or greater.
Please note that other RTR-500AW, TR-701AW/702AW/702AW-H (with the last four digits less than 1000) will not be supported.
Update on Feb.27, 2018
TR-71wf/72wf/72wf-S : The W-LAN Firmware Update Tool has been released.
This update is supported on products with the following serial numbers.
TR-71wf:
From 32120001 to 32120AB6 and
From 42120001 to 42120607
TR-72wf/TR-72wf-S:
From 32140001 to 321408D0 and
From 42140001 to 42140A8D
Useful Links
For further details about this security vulnerability:
Main Info Page: https://www.krackattacks.com
CERT/CC [Vulnerability Note VU#228519]: http://www.kb.cert.org/vuls/id/228519