As announced today in various IT news like Heise Security and The Register a belgian researcher published a paper called KrackAttacks (Key Reinstallation Attacks**) to break WPA2 by forcing nonce reuse.

As described this includes WPA2 with pre-shared key and WPA2 Enterprise, the attack is directed to the 4-way handshake and it looks like this is a client (laptop, mobile phone, tablet problem. This affects WPA2 directly, but not higher level protocols if TLS (Transport Layer Security) is used.

The consequence is to encrypt and check for encryption for all traffic send over a wireless network.