The WiFi Protected Access (WPA) protocol has a security vulnerability that allows a potential attacker to execute a Key Reinstallation Attack (“KRACK”), and is commonly known as the KRACK WiFi vulnerability. This vulnerability is part of the WiFi standard itself, and therefore can affect nearly all implementations. The details of this vulnerability are documented in the Vulnerability Notes Database: External Link: VU#228519.
Listed below are the WiFi-enabled devices that NI currently sells and the associated driver/firmware patch distribution. We will update this page with links as more of the driver/firmware patches become available. Application instructions are on each respective software download page.
Model | Driver/firmware Patch |
myRIO 1900 | NI CompactRIO Device Drivers December 2017 (17.6)1 |
CompactRIO 9032 | NI CompactRIO Device Drivers December 2017 (17.6)2 |
CompactRIO 9037 | NI CompactRIO Device Drivers December 2017 (17.6)2 |
CompactDAQ 9191 | cDAQ-9191 Firmware 1.7.1 |
VirtualBench 8012 | NI-VirtualBench 16.1.1 8012 Firmware |
VirtualBench 8034 | NI-VirtualBench 16.1.1 8034 Firmware |
VirtualBench 8054 | NI-VirtualBench 16.1.1 8054 Firmware |
1 Patch is for latest four supported versions of LabVIEW: 2017 SP1, 2016, 2015 SP1, 2014 SP1.
2 Patch is for all versions of LabVIEW that support this model.