So if I understand correctly, this is mostly about a MITM attack.
Indeed. In fact it is pretty one sided attack. It targets the client in the process of establishing a connection to an AP.
There is nothing an AP or wifi provider can do to mitigate this attack, they aren't technically in control of how the client responds to this.
APs are not vulnerable to this, unless they explicitly connect to other devices as clients themselves.
That is my guess as to why Aruba and other wifi router makers have created a "fix" for example
(eg. the client part of their code would be vulnerable also).
The one sidedness comes into play in that this isn't a MiTM where the attacker sits between the client and the AP.
The attacker becomes the AP that the client is fooled into connecting to.
You cannot extract the wifi pre-shared key, nor decrypt what the AP sent.
That is my understanding of it from a precursory scan of the implementation.
Once again this attack shows how important security layering is
VPN and HTTPs, etc. communication over Wifi are still safe.