|2017-11-21||Other||PHOENIX CONTACT||Mathy Vanhoef of imec-DistriNet, KU Leuven discovered these vulnerabilities. PHOENIX CONTACT reported these vulnerabilities to C||N/A||CVE-2017-1307 CVE-2017-1307 CVE-2017-1308 ||N/A||N/A||N/A|
# PHOENIX CONTACT WLAN Capable Devices using the WPA2 Protocol
### VULNERABLE VENDOR
### VULNERABLE PRODUCT
WLAN capable devices using the WPA2 Protocol
Mathy Vanhoef of imec-DistriNet, KU Leuven discovered these vulnerabilities. PHOENIX CONTACT reported these vulnerabilities to CERT@VDE. CERT@VDE coordinated these vulnerabilities with ICS-CERT.
### AFFECTED PRODUCTS
PHOENIX CONTACT reports that these vulnerabilities affect all versions of the following WLAN capable devices using the WPA2 Protocol:
FL COMSERVER WLAN 232/422/485,
FL WLAN 110x,
FL WLAN 210x,
FL WLAN 510x,
FL WLAN 230 AP 802-11,
FL WLAN 24 AP 802-11,
FL WLAN 24 DAP 802-11,
FL WLAN 24 EC 802-11,
FL WLAN EPA,
FL WLAN SPA,
VMT 50xx, and
Successful exploitation of these vulnerabilities could allow an attacker to operate as a “man-in-the-middle” between the device and the wireless access point.
### VULNERABILITY OVERVIEW
REUSING A NONCE, KEY PAIR IN ENCRYPTION CWE-323
Multiple products are affected by key reinstallation attacks known as KRACK.
The four-way hand shake traffic in the Wi-Fi Protected Access WPA and WPA2 protocol can be manipulated to allow nonce reuse resulting in key reinstallation.
This could allow an attacker to execute a “man-in-the-middle” attack, enabling the attacker within radio range to replay, decrypt, or spoof frames.
The following CVEs have been assigned to this group of vulnerabilities:
CVE-2017-13077: reinstallation of the pairwise key in the four-way handshake,
CVE-2017-13078: reinstallation of the group key in the four-way handshake, and
CVE-2017-13080: reinstallation of the group key in the group key handshake,
A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
Critical Infrastructure Sectors: Communications, Critical Manufacturing, Information Technology
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Germany
PHOENIX CONTACT has reported that users operating embedded devices in AP mode are not affected by these vulnerabilities. PHOENIX CONTACT is actively working on discovering how these vulnerabilities affect its products and plans to release future updates as they become available. For more information, please see the advisory at this location:
PHOENIX CONTACT recommends that users apply the security update provided by Microsoft at the following location for devices running Microsoft Windows:
If WPA-TKIP is being used for WLAN configuration, PHOENIX CONTACT recommends the user switch to AES-CCMP immediately.