Multiple Vulnerabilities (AKA FragAttacks) in WiFi Specification

← Back to Security Advisories Overview
Sophos Firewall
Sophos UTM
Sophos Wireless
Publication ID: sophos-sa-20210512-fragattacks
Article Version: 1
First Published:
Workaround: No


On May 12, 2021, the researcher Mathy Vanhoef released a security advisory disclosing multiple medium severity CVEs for the 802.11 Wireless Network Specification, which is applicable to a wide variety of WiFi products. These vulnerabilities can be triggered by an adjacent attacker. If exploited, these vulnerabilities may lead to information disclosure under certain conditions, as well as unauthorized participation in a vulnerable network.

Sophos customers using any of the products mentioned below are impacted. If you are not using these products, you are not impacted.

Applies to the following Sophos product(s) and version(s)

  • Sophos Firewall (XG and XGS) products with both integrated and add-on WiFi modules
  • Sophos UTM (SG) products with both integrated and add-on WiFi modules
  • APX 120, APX 320/X, APX 530, APX 740 access points (all management platforms)
  • AP 100/C/X, AP 55/C, AP 15/C access points (all management platforms)
  • RED and SD-RED with both integrated and add-on WiFi modules


Sophos is working on porting available patches to the impacted firmware versions for all of the products above.

Targeted Update Timelines

XG(S)/SG managed APX (APX120, APX320, APX530, APX740)

End July

XGS Integrated Wi-Fi and Optional Wi-Fi module

Early Aug

Central managed APX (APX120, APX320/X, APX530, APX740)

End Aug

Central managed AP (AP100/C/X, AP55/C, AP15/C)

End Aug

XG(S)/SG managed RED and SD-RED Wi-Fi

End Sep

XG Integrated Wi-Fi and Optional Wi-Fi module v18.x

End Sep

XG Integrated Wi-Fi and Optional Wi-Fi module v17.5

Mid Oct

XG(S)/SG managed AP (AP100/C/X, AP55/C, AP15/C)

Mid Oct

SG Integrated Wi-Fi and Optional Wi-Fi module

End Nov


Sophos will update this page with the latest information as it becomes available.

Related Information