|2017-12-19||Other||PEPPERL FUCHS/ecom instruments||Mathy Vanhoef of imec-DistriNet, KU Leuven discovered these vulnerabilities. PEPPERL FUCHS reported to CERT@VDE that their produ||N/A||CVE-2017-1307 CVE-2017-1307 CVE-2017-1307 CVE-2017-1308 CVE-2017||N/A||N/A||N/A|
# PEPPERL+FUCHS/ecom instruments WLAN Capable Devices using the WPA2 Protocol
### VULNERABLE VENDOR
### VULNERABLE PRODUCT
WLAN capable devices using the WPA2 Protocol
Mathy Vanhoef of imec-DistriNet, KU Leuven discovered these vulnerabilities. PEPPERL+FUCHS reported to CERT@VDE that their products are affected. CERT@VDE coordinated these vulnerabilities with ICS-CERT.
### AFFECTED PRODUCTS
PEPPERL+FUCHS/ecom instruments reports that these vulnerabilities affect all versions of the following WLAN capable devices using the WPA2 Protocol:
Successful exploitation of these vulnerabilities could allow an attacker to operate as a “man-in-the-middle” between the device and the wireless access point.
### VULNERABILITY OVERVIEW
REUSING A NONCE, KEY PAIR IN ENCRYPTION CWE-323
Multiple products are affected by key reinstallation attacks known as KRACK.
The four-way hand shake traffic in the Wi-Fi Protected Access WPA and WPA2 protocol can be manipulated to allow nonce reuse resulting in key reinstallation.
This could allow an attacker to execute a “man-in-the-middle” attack, enabling the attacker within radio range to replay, decrypt, or spoof frames.
The following CVEs have been assigned to this group of vulnerabilities:
CVE-2017-13077: Reinstallation of the pairwise key during the four-way handshake.
CVE-2017-13078: Reinstallation of the group key during the four-way handshake.
CVE-2017-13079: Reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake.
CVE-2017-13080: Reinstallation of the group key during the group key handshake.
CVE-2017-13081: Reinstallation of the IGTK during the group key handshake.
CVE-2017-13082: Reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake.
CVE-2017-13086: Reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake.
CVE-2017-13087: Reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.
CVE-2017-13088: Reinstallation of the IGTK when processing a WNM Sleep Mode Response frame.
A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
Critical Infrastructure Sectors: Communications, Critical Manufacturing, Information Technology
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Germany
PEPPERL+FUCHS/ecom instruments report the following mitigations:
Affected Products: Tab-Ex 01, Ex-Handy 09, Ex-Handy 209, Smart-Ex 01, Smart-Ex 201
ecom instruments is actively working on these vulnerabilities. This advisory will updated as soon as further significant details are provided by the vendor, with an emphasis on information about available patches.
Affected Products: Pad-Ex 01, i.roc Ci70-Ex, CK70A-ATEX, CK71A-ATEX, CN70A-ATEX, CN70E-ATEX
For ecom instruments devices running Windows, ecom instruments recommends users apply the security update provided by Microsoft. If users are using WPA-TKIP in their WLAN, users should switch to AES-CCMP immediately.
For more information CERT@VDE has released a security advisory found at: