About countermeasure to Wi-Fi WPA2
(Wi-Fi Protected Access II) vulnerability problem
Updated: Nov 20, 2018
The Wi-Fi WPA2 (Wi-Fi Protected Access II) vulnerability information has been published.
We will show the information below.
Please be advised that the information will be changed or added without notice.

Vulnerability summary
Details are explained in the sites below.
CERT : Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse

Content of countermeasure
Panasonic Windows OS-equipped model (except FZ-E1 / FZ-F1).
OS
Microsoft has been informed of countermeasure to vulnerability.
Please apply the update program to the following target OS according to the guidance of Microsoft Corporation.
[target OS]
Windows 7 SP1, Windows 8.1, Windows 10(Version1709 is not applicable)
WLAN and Bluetooth Driver
Target model | OS | Countermeasure module |
---|---|---|
CF-LX6Y (mk3) CF-SZ6R Asia-model (mk2) CF-XZ6R (mk1) |
Windows 10 | Released on December 19, 2017 |
CF-MX4E (mk1) CF-SX4E Asia-model (mk1) |
Windows 10 | Released on December 19, 2017 |
Windows 8.1 |
Released on March 19, 2018 Updated on July 31, 2018 |
|
Windows 7 |
Released on February 13, 2018 Updated on September 4, 2018 |
|
CF-AX3E (mk2) CF-LX3E (mk2) CF-LX3J (mk3) |
Windows 10 | Released on December 19, 2017 |
Windows 8.1 |
Released on March 19, 2018 Updated on July 31, 2018 |
|
Windows 7 | Released on February 13, 2018 | |
CF-20[A/B/C/D] (mk1) | Windows 10 | Released on December 19, 2017 |
Windows 7 |
Released on February 13, 2018 Updated on September 4, 2018 |
|
CF-33[A/B/C/L/M/N/V/W] (mk1) CF-54[G/H/J] (mk3) FZ-M1[D/ECD] (mk2) |
Windows 10 | Released on December 19, 2017 |
CF-33[D/E/P/Q] (mk1) CF-54[D/E/F] (mk2) CF-54[G/H/J] (mk3) CF-D1[N/Q] (mk3) FZ-G1[P/Q/R/S/T] (mk4) FZ-M1[ECF/F] (mk2) FZ-Q2[F/G] (mk1) FZ-Y1D (mk2) |
Windows 10 | Released on December 19, 2017 |
Windows 7 |
Released on February 13, 2018 Updated on September 4, 2018 |
|
CF-31[1/2/3/4] (mk5) CF-54[A/B/C] (mk1) FZ-G1[J/K/L/M/N] (mk3) FZ-Y1C (mk2) |
Windows 10 | Released on December 19, 2017 |
Windows 8.1 |
Released on March 19, 2018 Updated on July 31, 2018 |
|
Windows 7 |
Released on February 13, 2018 Updated on September 4, 2018 |
|
FZ-M1A (mk1) FZ-R1[A/F] (mk1) FZ-Q1A (mk1) |
Windows 10 | Released on December 19, 2017 |
Windows 8.1 |
Released on March 19, 2018 Updated on July 31, 2018 |
|
CF-53[2/3/4/5/7] (mk4) CF-C2C (mk2/mk2.5) FZ-G1F (mk2) FZ-M1C (mk1) FZ-Q1C (mk1) |
Windows 10 | Released on December 19, 2017 |
Windows 8.1 |
Released on March 19, 2018 Updated on July 31, 2018 |
|
Windows 7 | Released on February 13, 2018 | |
CF-19[0/1/2/3] (mk6) CF-19[5/6/8/9] (mk7) CF-19Z (mk8) CF-31[S/U/V] (mk3) CF-31[W/X/Y] (mk4) CF-53[J/M] (mk2) CF-53S (mk3) CF-AX2L (mk1) CF-C2A (mk1) CF-D1[G/K] (mk2) CF-H2[F/G/H] (mk2) CF-H2[P/Q/S] (mk3) CF-SX2J (mk1) FZ-G1[A/B/C] (mk1) UT-MA6 (mk1) UT-MB5 (mk1) |
Windows 10 Windows 8.1 Windows 7 |
There is no release of countermeasure module. Please confirm Note-1 below. |
∗Note-1 : For models of "no release", please take the following countermeasures.
Please apply the update program according to the contents of the above "[1] OS".
There is an effect of vulnerability only when WoWLAN is enabled. (Wake on Wireless LAN : function to resume from sleep state by wireless LAN) This function is disabled at the time of shipment and will not be enabled unless you change the setting. [Method of Confirming Setting of WoWLAN]
- Open [Device Manager], open [Network adapters], right click [Intel(R) **** 8265 (or 8260/7265/7260/6250/6235/6205)], click [Properties].
- Click [Power Management] tab.
- WoWLAN is enabled if there is a second check from the top, or if there is also a third check.
- To disable the WoWLAN settings, uncheck the second check from the top and click [OK].
If [Intel® Smart Connect Technology] is displayed in the task tray for your PC, Even if WoWLAN is enabled by the above confirmation method, there is no effect of vulnerability.
ME Firmware and ME driver
It affects only when using the Intel® Active Management Technology (AMT) function via wireless LAN.
This function is disabled at the time of shipment and it will not be enabled unless you change the BIOS setting.
Countermeasure module was released in some models.
Group | Target model | OS | Countermeasure module |
---|---|---|---|
1 | CF-33 | CF-33[A/B/C/L/M/N/V/W]****** (mk1) |
Released on March 9, 2018 Updated on July 10, 2018 |
CF-54 | CF-54[G/H/J]****** (mk3) |
Released on March 9, 2018 Updated on July 10, 2018 |
|
CF-LX6 | CF-LX6YDAZTM (mk3) |
Released on March 9, 2018 Updated on July 10, 2018 |
|
CF-SZ6 | CF-SZ6R***** (mk2) |
Released on March 9, 2018 Updated on July 10, 2018 |
|
CF-XZ6 | CF-XZ6R***** (mk1) |
Released on March 9, 2018 Updated on July 10, 2018 |
|
2 | CF-20 | CF-20[A/B/C/D]****** (mk1) |
Released on February 15, 2018 Updated on August 28, 2018 |
CF-33 | CF-33[D/E/P/Q]****** (mk1) |
Released on February 15, 2018 Updated on August 28, 2018 |
|
CF-54 | CF-54[D/E/F]****** (mk2) |
Released on February 15, 2018 Updated on August 28, 2018 |
|
CF-D1 | CF-D1[N/Q]****** (mk3) |
Released on February 15, 2018 Updated on August 28, 2018 |
|
FZ-G1 | FZ-G1[P/Q/R]****** (mk4) |
Released on February 15, 2018 Updated on August 28, 2018 |
|
FZ-M1 | FZ-M1F******, FZ-M1ECF***R (mk2) |
Released on February 15, 2018 Updated on August 28, 2018 |
|
FZ-Q2 | FZ-Q2[F/G]****** (mk1) |
Released on February 27, 2018 Updated on August 28, 2018 |
|
3 | CF-31 | CF-31[1/2/3/4]****** (mk5) *1 |
Released on April 2, 2018 Updated on September 25, 2018 Only AMT user will be affected by this vulnerability. |
CF-54 | CF-54[A/B/C]****** (mk1) | ||
CF-MX4 | CF-MX4E***** (mk1) *2 | ||
CF-SX4 | CF-SX4E***** (mk1) | ||
FZ-G1 | FZ-G1[J/K/L/M/N]****** (mk3) *3 | ||
FZ-Y1 | FZ-Y1[C/D]****** (mk2) | ||
4 | CF-53 | CF-53[2/3/4/5/7]****** (mk4) |
Released on April 25, 2018 Updated on October 30, 2018 Only AMT user will be affected by this vulnerability. |
CF-AX3 | CF-AX3E***** (mk2) | ||
CF-C2 | CF-C2[C/D]****** (mk2/mk2.5) | ||
CF-LX3 | CF-LX3J***** (mk3) | ||
CF-LX3E***** (mk2) | |||
FZ-G1 | FZ-G1F****** (mk2) | ||
FZ-M1 | FZ-M1C****** (mk1) *8 | ||
FZ-Q1 | FZ-Q1C****** (mk1) | ||
5 | CF-19 | CF-19Z****** (mk8) *4 |
Released on November 20, 2018 Only AMT user will be affected by this vulnerability. |
CF-19[5/6/8/9]****** (mk7) | |||
CF-19[0/1/2/3]****** (mk6) *5 | |||
CF-31 | CF-31[W/X]****** (mk4) *6 | ||
CF-31[S/U]****** (mk3) *7 | |||
CF-52 | CF-52V****** (mk5) | ||
CF-53 | CF-53[S/T/U/V]****** (mk3) | ||
CF-53[J/K/M]****** (mk2) | |||
CF-AX2 | CF-AX2L***** (mk1) | ||
CF-C2 | CF-C2A****** (mk1) | ||
CF-D1 | CF-D1G****** (mk2) | ||
CF-H2 | CF-H2[P/Q/S]****** (mk3) | ||
CF-H2[F/G/H]****** (mk2) | |||
CF-SX2 | CF-SX2J***** (mk1) | ||
FZ-G1 | FZ-G1[A/B/C]****** (mk1) | ||
UT-MA6 | UT-MA6****** (mk1) | ||
UT-MB5 | UT-MB5****** (mk1) |