When selecting wireless products, it is very important not only to have compatible specifications, but also to be able to quickly address vulnerabilities.
Regarding security vulnerabilities (Bluetooth/Wi-Fi specifications themselves, TCP/IP stacks, other SW implementations, etc.), Microchip confirms whether or not there are vulnerabilities in its own products in response to the latest reports from universities and specialized institutions. If there is, we will release a security patch in Firmware Update and respond promptly.
Please refer to the table below for the latest vulnerability countermeasures.
Vulnerability name | subject | Impact/Response to Microchip Products | Report year |
KRACK | Wi-Fi (WPA2) | Supported by FW Update | 2017 |
BlueBorne Attack Vector | Bluetooth (Classic) | No vulnerability | 2017 |
Key Negotiation of Bluetooth (KNOB) | Bluetooth (Classic) | Supported by FW Update | 2019 |
Kr00k | Wi-Fi (WPA2) | No vulnerability | 2019 |
Sweyntooth | Bluetooth (BLE) | Supported by FW Update | 2019 |
Bluetooth Impersonation Attacks (BIAS) | Bluetooth (Classic) | Supported by FW Update | 2020 |
AMNESIA:33 | TCP/IP | Supported by FW Update | 2020 |
*Regarding FW Update support, some ROM products and some model numbers do not support FW Update.
Please check the manufacturer's website for details.
To Microchip manufacturer information Top
If you want to return to Microchip manufacturer information top page, please click below.
Free online seminar
If you know this, you can develop Bluetooth products! Bluetooth beginner's seminar 2021/3/23 (Tue)