Also, is there anything about how the patch works?
Does it prevent the emptying of the WiFi password or something else.
It might depend a bit on the actual vendor - it's not like all vendors take a patch and distribute the same thing. And different systems were vulnerable to different attacks (such as iOS 10.3.1+ and Windows 10 not being vulnerable to the 4-way handshake attack but still being vulnerable to the group key attack).
WiFi passwords are never compromised during any variation of the key reinstallation attacks, so that's not a concern.
As an example, here's Arch Linux's fix for wpa_supplicant.
https://git.archlinux.org/svntogit/...t&id=9c1bda00a846ff3b60e7c4b4f60b28ff4a8f7768
No. If you actually read about it, you would know that these vulnerabilities affect WPA and WPA2 protected WiFi connections.
Now say you are using a 4G/LTE mobile hotspot or using your 4G/LTE capable phone or tablet as a mobile hotspot, then yes, in a sense 4G is affected but not really.
So since my router is a cable given router, I have to wait to see my provider update the router. Ugh.
Crap, my ISP is the one that handles all of the router's settings and stuff (like the website for managing the router is literally blocked). I hope that someone at IT learns about this and updates the routers.
I doubt that Sony updates the Xperia Z3 as well, ah damn.
So I'm not seeing an option to update my uverse router. Is there no patch or does ATT automatically update their routers?.
Prioritize patching your client devices, such as your phones, tablets, computers, game consoles, IoT/smart home devices, televisions, and anything else. Routers cannot be the targets of attackers using these vulnerabilities unless you are using a router as a range extender.
And not all vendors have patches out yet, and some may not receive patches at all, in particular for routers and access points, because again, they are not the ones technically affected by these vulnerabilities.
EDIT: You will still want to patch your access points/routers if you can to prevent attacks on the Fast BSS Transition handshake if they support 802.11r.
Is there any way to determine what specific Windows update(s) actually fix this? None of the ones installed on my Windows 8.1 PC or Windows 10 laptop match the ones that mentioned in this thread, and none of the articles I've read have been any help.
There's no hope in sight for my router, tablet or phone, so I'd at least like to save my computers. ;_;
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
You should be able to see all the information there. Find the applicable operating system version on that page, and there's a download link for each one. Those links should specifically show what updates include this fix. You can manually download the update, or just use Windows Update and they should appear.