On August 4, 2018, a new exploit to the previously released KRACK vulnerability within WPA/WPA2-PSK (Pre-Shared Key), was announced. This exploit allows for an attacker to obtain the PSK used for encryption within a wireless network.
Yesterday, a number of our clients began to receive notifications from Meraki support announcing this exploit. After a review of these messages, we have determined that while most of these users were not at risk, a handful were configured to use the 802.11r roaming feature with WPA2-PSK, placing them at risk.
If your network is at risk, we will be contacting you to schedule a time to disable the 802.11r feature within your network, mitigating the risk. Once the change has been made, there will be a very brief (less than one minute) disruption in wireless service as the change is propagated throughout your wireless network. We do not anticipate disabling this feature will have any negative impact on your network.
If you have any questions, please contact your Account Manager or email firstname.lastname@example.org.