A couple of months ago, a vulnerability in the way handshake within the WPA protocol was exposed which is commonly referred to as the Krack Attack. We at Silex have completed our thorough investigation to assess the scope and impact of this vulnerability.
All protected Wi-Fi networks are secured using some version of Wi-Fi Protected Access (WPA/2) which rely on the 4-way handshake defined in the 802.11i amendment. Key Re installation AttaCK (KRACK) abuses design or implementation flaws in the WPA2 cryptographic protocols. KRACK works by targeting these 4-way handshakes and thus both WPA and WPA2-certified products are affected by this Krack Attack. 
WPA (sometimes referred to as the draft IEEE 802.11i standard) became available in 2003. To put things in perspective this issue has always been present for the last 14 years, but has recently gained quite a bit of attention. Let's first understand what this WPA2 vulnerability is and asses it's impact.
Wi-Fi Enterprise Security is critical to Silex as we strive to provide secure, reliable and robust wireless connectivity solutions to our customers. We want to assure our customers that we are well aware of the recent KRACK attack threat to WPA2 Wi-Fi security, and we will be providing a solution imminently.
Recently published research in below references have identified vulnerabilities in some Wi-Fi devices. Those devices reinstall network encryption keys under certain conditions, disabling replay protection and significantly reducing the security of encryption. This security vulnerability is inherent to the WPA2 protocol itself, and in principle impacts all products using the WPA security supplicant.