Fragment and Forge vulnerabilities(FragAttacks) Statement
Security AdvisoryUpdated 05-18-2021 06:19:18 AM 537
This Article Applies to:
RE603X( V1 ) , RE605X( V1 ) , Archer AX20( V1 V1.20 ) , Archer AX10( V1 V1.20 ) , Archer AX1500( V1 V1.20 ) , Deco X68( V1 ) , Archer AX90( V1 ) , Deco X90( V1 )
For additional information, see:
https://www.wi-fi.org/security-update-fragmentationTP-Link is aware that researchers have disclosed a set of vulnerabilities about Wi-Fi named FragAttacks.
As soon as we became aware of the details, we immediately launched an investigation. As the investigation progresses, TP-Link will update this advisory with information about affected products.
According to the investigation, the following conditions are required to exploit the wireless vulnerability:
Someone knows your Wi-Fi password and connects to your Wi-Fi network
Someone needs to intercept communication between your router and devices on your Wi-Fi.
In order to achieve the purpose of obtaining private information, an attacker would need to trick a user on the network to visit the attacker's server (Phishing Email, malicious ads, etc.).
Workarounds
Set a strong Wi-Fi password and change it regularly. Being careful not to share your Wi-Fi password.
Periodically check the devices connected to your network. If you see any unknown device, block these devices and change your Wi-Fi password.
We recommend that you use HTTPS protocol to access the website. Don't click on emails from unknown recipients or visit suspicious websites.
Affected
TP-Link will update this advisory as new information emerges.
SOHO Router
Model number
Date
Fixed in Firmware Version
Archer AX90(US)_V1.0
2021/04/29
Archer AX90(US)_V1_210312
Archer AX90(EU)_V1.0
2021/04/29
Archer AX90(EU)_V1_210312
Archer AX10(EU)_V1.0
2021/05/14
Archer AX10(EU)_V1_210420
Archer AX10(US)_V1.0
2021/05/14
Archer AX10(US)_V1_210420
Archer AX10(US)_V1.2
2021/05/14
Archer AX10(US)_V1.2_210421
Archer AX20(EU)_V1.0
2021/05/17
Archer AX20(EU)_V1.0_210514
Archer AX20(US)_V1.0
2021/05/17
Archer AX20(US)_V1.0_210514
Archer AX20(US)_V1.2
2021/05/17
Archer AX20(US)_V1.2_210514
Archer AX20(EU)_V2.0
2021/05/17
Archer AX20(EU)_V2.0_210514
Archer AX20(US)_V2.0
2021/05/17
Archer AX20(US)_V2.0_210514
Archer AX1500(EU)_V1.0
2021/05/17
Archer AX1500(EU)_V1.0_210514
Archer AX1500(US)_V1.0
2021/05/17
Archer AX1500(US)_V1.0_210514
Archer AX1500(US)_V1.2
2021/05/17
Archer AX1500(US)_V1.2_210514
Range Extender
Model number
Date
Fixed in Firmware Version
RE505X_V1
2021/05/17
RE505X_V1_210514
RE603X_V1
2021/05/17
RE603X_V1_210514
RE605X_V1
2021/05/17
RE605X_V1_210514
Deco
Model number
Date
Fixed in Firmware Version
Deco X90_V1
2021/05/17
Deco X90_V1_20210514
Deco X68_V1
2021/05/17
Deco X68_V1_20210514
Revision History
2021-05-14 Published advisory
Disclaimer
FragAttacks vulnerabilities will remain if you do not take all recommended actions. TP-Link cannot bear any responsibility for consequences that could have been avoided by following the recommendations in this statement.
https://www.tp-link.com/en/support/faq/3056/