I have a wireless router and I worried about WPA-2 Vulnerability. I check manufacture site and they did not have my router as affected by this but when I read article about this Vulnerability it made it seem like everything had this Vulnerability and the world was going to burn. I don't know. Is my device safe since the manufacture site didn't have my router as affected.
you probably have it too, since the protocol has vulnerability, either just use ethernet cable, or change router, or just use a vpn.
They didn't have it affected. here is the site i checked: https://kb.netgear.com/000049498/Se...ies-PSV-2017-2826-PSV-2017-2836-PSV-2017-2837
Note that they can only see your traffic, since sites use encrypton (https, etc). This means while it is a big deal, it is not extremely bad.
If you live in the sticks with nobody around you then you don't have to worry at all. Otherwise start using Cable internet or VPN. Use HTTPS websites if you still want to use wifi and don't have a VPN. Finally, wait for a fix and update accordingly on all of your devices (pc, phone, tablets ect.).
All routers which use WPA2 are vulnerable. The most likely fix for it will be a software patch for whatever OS you use. Well according to https://techcrunch.com/2017/10/16/wpa2-shown-to-be-vulnerable-to-key-reinstallation-attacks/
https://www.eff.org/https-everywhere makes connections https to protect you. can help until the firmware is updated.
My assumption is going to be yes but the best thing you can do is contact your vendor of the router and figure that out.
if you looked. They didn't have it affected. here is the site i checked: https://kb.netgear.com/000049498/Se...ies-PSV-2017-2826-PSV-2017-2836-PSV-2017-2837
I will even be so daring to say All routers are vulnerable. If you don't know how to block the 10+ holes that comes preinstalled with each router just don't bother with terms like safety. The real news was that WPA2 could not longer be counted on, your router has always been an open box.
I guess that means you are not vulnerable. Hmm, the curious thing though is according to the researchers the vulnerability of the KRACK Attack is based on the WPA-2 standard itself not the way its implemented or individual products but I suppose there is a possibly of it not affecting you. According to the Researchers website, "Our main attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to confirm that both the client and access point possess the correct credentials (e.g. the pre-shared password of the network). At the same time, the 4-way handshake also negotiates a fresh encryption key that will be used to encrypt all subsequent traffic. Currently, all modern protected Wi-Fi networks use the 4-way handshake. This implies all these networks are affected by (some variant of) our attack. For instance, the attack works against personal and enterprise Wi-Fi networks, against the older WPA and the latest WPA2 standard, and even against networks that only use AES." Source: https://www.krackattacks.com/
Based on only the information you provided, a short answer would be yes. If only using the typical WPA-2 encryption and no other security measures are in effect for data transmitted wirelessly over the network then it is all the more possible for a successful intrusion of the network and access to the data. An example of an additional security measure is when browsing websites with HTTPS. That is not saying that alone is enough a foolproof measure but the more you learn about how you are transmitting your data and the associated risks and risk mitigation options then the better you can make efforts to protect it. As mentioned by others, not using a wireless network would alleviate this concern and going with a wired only connection would eliminate the need to worry about this recent vulnerability. To say little of other concerns such as the inherent risks that exist with a determined individual that has the knowledge, skills and ability to circumvent other security measure of a computer network using various other methods. You should check to see if any of the Operating Systems (such as Windows, Linux, Android, iOS…) you use have any applicable patches/updates that may be available and are not yet installed. For example Microsoft should have released an update on 10 October regarding this issue.