This page includes information resulting from contacting of vendors, CERT's informative page, and other sources.
Last Updated: 10/20/17 EST ADTRAN posted in their forums that they are performing an investigation and will send out a security notice to all signed up users with details.
I found a documentation for ar93x1, which might be identical to the 9330 and set the corresponding registers to _not_ reboot after watchdog timeout: 6.6.3 Watchdog Timer Control Register (RST_WATCHDOG_TIMER_CONTROL) Address: 0x18060008 Access: See field description Reset: 0x0 Sets the action to take when the watchdog timer reaches zero.
The easiest way to update Unwired One's firmware is to use Lu CI web interface.
A security advisory was sent out on 10/18/17 to customers that basically reiterates the same information.
Aerohive has released an advisory explaining under what circumstances their products are vulnerable to KRACK.
Then login to the board with any SSH client and run: cd /tmp wget -v /tmp/openwrt-ar71Unwired One's version of the popular U-Boot bootloader supports USB flashing: it is possible to reflash selected partitions or the whole flash image using regular USB stick.
[ 0.630000] msgmni has been set to 55 [ 0.640000] io scheduler noop registered [ 0.640000] io scheduler deadline registered (default) [ 0.640000] Serial: 8250/16550 driver, 1 ports, IRQ sharing disabled [ 0.650000] ar933x-uart: tty ATH0 at MMIO 0x18020000 (irq = 11, base_baud = 1562500) is a AR933X UART [ 0.660000] m25p80 spi0.0: found mx25l6405d, expected m25p80 [ 0.670000] m25p80 spi0.0: mx25l6405d (8192 Kbytes) [ 0.670000] 5 cmdlinepart partitions found on MTD device spi0.0 [ 0.680000] Creating 5 MTD partitions on "spi0.0": [ 0.680000] 0x000000000000-0x000000040000 : "u-boot" [ 0.690000] 0x000000040000-0x000000050000 : "u-boot-env" [ 0.690000] 0x000000050000-0x0000007b0000 : "firmware" [ 0.710000] 2 uimage-fw partitions found on MTD device firmware [ 0.720000] 0x000000050000-0x0000001655ff : "kernel" [ 0.720000] 0x0000001655ff-0x0000007b0000 : "rootfs" [ 0.730000] mtd: device 4 (rootfs) set to be root filesystem [ 0.730000] 1 squashfs-split partitions found on MTD device rootfs [ 0.740000] 0x000000360000-0x0000007b0000 : "rootfs_data" [ 0.740000] 0x0000007b0000-0x0000007f0000 : "cfg" [ 0.750000] 0x0000007f0000-0x000000800000 : "EEPROM" [ 0.770000] libphy: ag71xx_mdio: probed [ 1.370000] ag71xx-mdio.1: Found an AR7240/AR9330 built-in switch [ 1.400000] eth0: Atheros AG71xx at 0xba000000, irq 5, mode: GMII ?
There is no current evidence of malicious exploits.
ARRIS is evaluating our full Wi-Fi portfolio and will release any required firmware updates as quickly as possible.
To help with this, I have created a list of known information regarding various Wi Fi vendors and whether new drivers are available.
As this vulnerability is fairly new, there is little information available, I advise you to check this page throughout the coming days to see if new information is available.