The United States Computer Emergency Readiness Team Has Issued the Following:
US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.
What This Means
WPA2, the method in which almost all WiFi traffic is protected has been found to have a bug that allows an attacker intercept passwords, email or data and bypassing any encryption provided by WPA2.
Who/What is affected:
Almost any device using WiFi can have its traffic intercepted by a nearby attacker.
The attacker must be in range of the Wifi connection.
What Should I Do?
It is recommended that all routers and clients be updated immediately and users refrain from using WiFi until both routers and client computers have been patched.
Microsoft reports that computers running Windows 8 or newer and that have automatic updates turned on should already be patched. They advise that users should manually update or confirm the automatic installation of all patches.
IOS and Mac Users are susceptible to the hack. Apple has not yet released a patch.
Android users are especially susceptible as a variant of the exploit exists that can actually inject data into the phone itself. Google is set to release a security patch on November 6th however not all carriers push the latest patches immediately.
Routers and Wireless Access Points will also require an update. CERT () maintains a list of effected vendors:
Installation of patches will vary by vendor.
Official Release (Technical)
Manufacturer Specific Vulnerabilities