Press Releases

  • [Vendor Update] Coronet is the First Company to Offer Protection Against KRACK with Its SecureCloud Platform

    It goes withhout saying that Wi-Fi networks are of paramount importance, no matter where you are. Acting as a window to Internet access, billions of people around the world rely on Wi-Fi connections for their day-to-day activities - with an increasing amount involving e-communication of sensitive information such as personal data and credit card details. With the KRACK hack exploiting weaknesses in WPA2 networks, KRACK attacks pose an immediate threat to businesses and even individuals. 

    There are numerous guidelines and CERT advisories readily available online, yet they are not sufficient enough in providing full protection against the KRACK threat. Quantiq International's latest ally, Coronet is the first company to offer such protection, providing organisations and individuals total tranquility when it comes to connecting to Wi-Fi networks. See what Coronet had to say in addressing the KRACK hack:          

    Coronet’s SecureCloud, the platform that offers end to end outside the perimeter security, confirms that it is the first company to offer protection against KRACK.

    In a paper written by Belgian researchers, a vulnerability in WPA and WPA2 protocols was published in which an attacker executing a multi stage attack could circumvent the built-in protections built into these commonly used protocols.

    While most key vendors are working on patches to address KRACK, an exploit golden hour exists for attackers which can extend indefinitely for endpoints and IOT devices that are not expected to receive updates.  

    Coronet is the only available solution in the market that can protect devices from this vulnerability, eliminating the risk regardless of availability of a patch. Coronet’s SecureCloud platform’s network detection and mitigation layer can not only identify a KRACK attack, but also automatically mitigate it.

    What is the attack?

    An attacker can get in a MITM position and circumvent the WPA/WPA2 protection, providing the attacker the ability to access corporate data for both data stream inspection, as well as packet injection. 

    Who is vulnerable?


    (*) In addition to the protocol vulnerabilities, Android 6.0 and up and Linux with wpa_supplicant versions 2.4 and 2.5 have a bug that installs an all-zero encryption key (KT), practically exposing these OS to all vulnerabilities in both directions.

    Are patches available?

    Some are already available. Here is a list:

    The attack surface:

    While any unpatched device connecting to WPA/WPA2 is vulnerable, the largest attack surface is devices running Android 6.0 and higher, representing 48% of all android devices (or about 1 Billion devices). Some of these Android devices may not be patchable, and as such will remain vulnerable.

    What should you do?

    If you are a Coronet customer: you need to do nothing, you are already protected.

    In case of non-Coronet customer:

    1. As a good practice, always ensure your devices are patched with the latest OS and vendor updates once available.
    2. For APs for which a patch is yet to be released, disable the Fast Transition (802.11r) option.
    3. Make sure all your information is accessed using only secure HTTPS/TLS protocols.

    To find out how Coronet and its SecureCloud platform can protect your organization from KRACK and all other attacks outside the perimeter, Visit 

    Or contact Quantiq's sales representative: Cindy Chua, Vendor Alliances Manager | Email:


    Back to Press Releases