A
recent paper shows that the cracks in WPA/TKIP are getting wider and more numerous. There's now a practical (~ one minute) method that allows a man-in-the-middle attacker to read and spoof short packets. It still can't pull an encryption key, but if you're security-minded it's probably best to switch to WPA2/AES if you haven't already.