SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-114503296] PEPPERL FUCHS/ecom instruments WLAN Capable Devices using the WPA2 Protocol

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2017-12-19OtherPEPPERL FUCHS/ecom instrumentsMathy Vanhoef of imec-DistriNet, KU Leuven discovered these vulnerabilities. PEPPERL FUCHS reported to CERT@VDE that their produN/ACVE-2017-1307 CVE-2017-1307 CVE-2017-1307 CVE-2017-1308 CVE-2017N/AN/AN/A

Source

						
							
								
#
# PEPPERL+FUCHS/ecom instruments WLAN Capable Devices using the WPA2 Protocol
#


### VULNERABLE VENDOR
PEPPERL+FUCHS/ecom instruments


### VULNERABLE PRODUCT
WLAN capable devices using the WPA2 Protocol 


### RESEARCHER
Mathy Vanhoef of imec-DistriNet, KU Leuven discovered these vulnerabilities. PEPPERL+FUCHS reported to CERT@VDE that their products are affected. CERT@VDE coordinated these vulnerabilities with ICS-CERT.


### AFFECTED PRODUCTS
PEPPERL+FUCHS/ecom instruments reports that these vulnerabilities affect all versions of the following WLAN capable devices using the WPA2 Protocol:

Tab-Ex 01,
Ex-Handy 09,
Ex-Handy 209,
Smart-Ex 01,
Smart-Ex 201,
Pad-Ex 01,
i.roc Ci70-Ex,
CK70A-ATEX,
CK71A-ATEX,
CN70A-ATEX, and
CN70E-ATEX


### IMPACT
Successful exploitation of these vulnerabilities could allow an attacker to operate as a “man-in-the-middle” between the device and the wireless access point.


### VULNERABILITY OVERVIEW
REUSING A NONCE, KEY PAIR IN ENCRYPTION CWE-323
Multiple products are affected by key reinstallation attacks known as KRACK.
The four-way hand shake traffic in the Wi-Fi Protected Access WPA and WPA2 protocol can be manipulated to allow nonce reuse resulting in key reinstallation.
This could allow an attacker to execute a “man-in-the-middle” attack, enabling the attacker within radio range to replay, decrypt, or spoof frames.
The following CVEs have been assigned to this group of vulnerabilities:
CVE-2017-13077: Reinstallation of the pairwise key during the four-way handshake.
CVE-2017-13078: Reinstallation of the group key during the four-way handshake.
CVE-2017-13079: Reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake.
CVE-2017-13080: Reinstallation of the group key during the group key handshake.
CVE-2017-13081: Reinstallation of the IGTK during the group key handshake.
CVE-2017-13082: Reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake.
CVE-2017-13086: Reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake.
CVE-2017-13087: Reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.
CVE-2017-13088: Reinstallation of the IGTK when processing a WNM Sleep Mode Response frame.
A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)





### BACKGROUND
Critical Infrastructure Sectors: Communications, Critical Manufacturing, Information Technology
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Germany




### MITIGATION

PEPPERL+FUCHS/ecom instruments report the following mitigations:

Android
Affected Products: Tab-Ex 01, Ex-Handy 09, Ex-Handy 209, Smart-Ex 01, Smart-Ex 201
ecom instruments is actively working on these vulnerabilities. This advisory will updated as soon as further significant details are provided by the vendor, with an emphasis on information about available patches.

Windows
Affected Products: Pad-Ex 01, i.roc Ci70-Ex, CK70A-ATEX, CK71A-ATEX, CN70A-ATEX, CN70E-ATEX
For ecom instruments devices running Windows, ecom instruments recommends users apply the security update provided by Microsoft. If users are using WPA-TKIP in their WLAN, users should switch to AES-CCMP immediately.

For more information CERT@VDE has released a security advisory found at:

https://cert.vde.com/de-de/advisories/vde-2017-005