Apple has released firmware updates for their AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations.
Version 7.6.9 is for AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations with 802.11n. Version 7.7.9 is for AirPort Extreme and AirPort Time Capsule base stations with 802.11ac.
The firmware updates improve the security of your AirPort devices, fixing recently discovered security flaws. The updates do address the KRACK Wi-Fi vulnerability as well as a few other security issues.
AirPort Base Station Firmware Update 7.6.9
Released December 12, 2017
AirPort Base Station Firmware
Available for: AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations with 802.11n
Impact: An attacker in Wi-Fi range may force nonce reuse in WPA unicast/PTK clients (Key Reinstallation Attacks – KRACK)
Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management.
CVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU Leuven
CVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU Leuven
AirPort Base Station Firmware
Available for: AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations with 802.11n
Impact: An attacker in Wi-Fi range may force nonce reuse in WPA multicast/GTK clients (Key Reinstallation Attacks – KRACK)
Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management.
CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven
AirPort Base Station Firmware Update 7.7.9
Released December 12, 2017
AirPort Base Station Firmware
Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac
Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-9417: Nitay Artenstein of Exodus Intelligence
AirPort Base Station Firmware
Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac
Impact: An attacker in Wi-Fi range may force nonce reuse in WPA unicast/PTK clients (Key Reinstallation Attacks – KRACK)
Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management.
CVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU Leuven
CVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU Leuven
AirPort Base Station Firmware
Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac
Impact: An attacker in Wi-Fi range may force nonce reuse in WPA multicast/GTK clients (Key Reinstallation Attacks – KRACK)
Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management.
CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven
Instructions for updating your AirPort base station are as follows:
How to get the latest firmware for your AirPort base station
- Make sure that you’re connected to the Internet.
- If you’re using your base station to share a hard drive on your network, make sure that none of the devices on your network are currently using that drive. Updating an AirPort base station causes it and its network services to be temporarily unavailable.
- Open AirPort Utility on one of your devices.
- On Mac, AirPort Utility is installed in the Utilities folder of your Applications folder. You can also find it with Spotlight.
- On iPhone, iPad, or iPod touch, get AirPort Utility from the App Store.
- If AirPort Utility shows a numbered red badge next to the name of a base station, click it for details. (If the base station is protected by a device password, you might not see a badge until you click the base station and enter the password.)
- Install the update, if available:
- On Mac, the details pop-up shows an Update button when a firmware update is available. Click the button to install.
- On iOS devices, tap Version on the details screen. If an update is available, tap Download and Install.