When selecting wireless products, it is very important not only to have compatible specifications, but also to be able to quickly address vulnerabilities.

Regarding security vulnerabilities (Bluetooth/Wi-Fi specifications themselves, TCP/IP stacks, other SW implementations, etc.), Microchip confirms whether or not there are vulnerabilities in its own products in response to the latest reports from universities and specialized institutions. If there is, we will release a security patch in Firmware Update and respond promptly.

Please refer to the table below for the latest vulnerability countermeasures.

 

 

Vulnerability name subject Impact/Response to Microchip Products Report year
KRACK Wi-Fi (WPA2) Supported by FW Update 2017
BlueBorne Attack Vector Bluetooth (Classic) No vulnerability 2017
Key Negotiation of Bluetooth (KNOB) Bluetooth (Classic) Supported by FW Update 2019
Kr00k Wi-Fi (WPA2) No vulnerability 2019
Sweyntooth Bluetooth (BLE) Supported by FW Update 2019
Bluetooth Impersonation Attacks (BIAS) Bluetooth (Classic) Supported by FW Update 2020
AMNESIA:33 TCP/IP Supported by FW Update 2020

*Regarding FW Update support, some ROM products and some model numbers do not support FW Update.

Please check the manufacturer's website for details.

To Microchip manufacturer information Top

If you want to return to Microchip manufacturer information top page, please click below.

Free online seminar

If you know this, you can develop Bluetooth products! Bluetooth beginner's seminar 2021/3/23 (Tue)