“KRACK” WiFi Vulnerability

Publish Date: Feb 25, 2019 | 1 Ratings | 1.00 out of 5 | Print

Table of Contents

  1. Overview
  2. Affected Products
  3. Related Links

1. Overview

The WiFi Protected Access (WPA) protocol has a security vulnerability that allows a potential attacker to execute a Key Reinstallation Attack (“KRACK”), and is commonly known as the KRACK WiFi vulnerability. This vulnerability is part of the WiFi standard itself, and therefore can affect nearly all implementations. The details of this vulnerability are documented in the Vulnerability Notes Database: External Link: VU#228519.


Back to Top

2. Affected Products

Listed below are the WiFi-enabled devices that National Instruments currently sells and the associated driver/firmware patch distribution. We will update this page with links as more of the driver/firmware patches become available. Application instructions are on each respective software download page.

Model Driver/firmware Patch
myRIO 1900 NI CompactRIO Device Drivers December 2017 (17.6)1
CompactRIO 9032 NI CompactRIO Device Drivers December 2017 (17.6)2
CompactRIO 9037 NI CompactRIO Device Drivers December 2017 (17.6)2
CompactDAQ 9191 cDAQ-9191 Firmware 1.7.1
VirtualBench 8012 NI-VirtualBench 16.1.1 8012 Firmware
VirtualBench 8034 NI-VirtualBench 16.1.1 8034 Firmware
VirtualBench 8054 NI-VirtualBench 16.1.1 8054 Firmware


1 Patch is for latest four supported versions of LabVIEW: 2017 SP1, 2016, 2015 SP1, 2014 SP1.

2 Patch is for all versions of LabVIEW that support this model.


Back to Top

3. Related Links

External Link: Vulnerability Note VU#228519
NI CompactRIO Device Drivers December 2017 (17.6)


Back to Top

Bookmark & Share


Rate this document

Answered Your Question?
Yes No