Back to overview

PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption

VDE-2017-003
Last update
05/14/2025 14:28
Published at
11/09/2017 17:20
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2017-003
CSAF Document

Summary

Multiple security issues and vulnerabilities within the WPA2 standard have been identified and publicized by Mr. Mathy Vanhoef of KU Leuven. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point (AP). In consequence, an attacker could establish a man-in-the-middle position between AP and client facilitating packet decryption and injection.

Update A / Revision 2 - 2017-11-09
* Added a detailed list of affected products

Update B / Revision 3 - 2018-09-24
* Added firmware update information, see section "Solution"

Impact

PHOENIX CONTACT embedded devices running in AP mode are not affected by these vulnerabilities. If devices are used in client or repeater mode, an attacker could in theory decrypt any packet sent by the client. Devices of the FL WLAN 110x, 210x, and 510x product families are only affected to a very limited extent. With these devices, only data packets sent within three seconds after key renewal could possibly be decrypted by a successful attacker. In general, if TCP SYN packets are decrypted, this can be used to hijack TCP connections and inject malicious traffic into unencrypted protocols. However, to perform the attack, the attacker must be significantly closer to the WLAN client than the access point. In industrial or indoor applications, the attacker would have to be inside the plant. A successful external attack therefore seems to be very difficult. Furthermore, the WPA2 password cannot be compromised using a KRACK attack. It is not possible for the attacker to gain full access to the network. However, note that if WPA-TKIP is used instead of AES-CCMP, the impact of this vulnerability is much more severe, because an attacker can then not only decrypt packets, but also forge and inject packets directly into the WLAN.

Affected Product(s)

Model no. Product name Affected versions
2404777 BL2 BPC 1000 Firmware BL2 all versions
2404844 BL2 BPC 2000 Firmware BL2 all versions
2404845 BL2 PPC 1000 Firmware BL2 all versions
BL2 PPC 2000 Firmware BL2 all versions
2313559 FL COMSERVER WLAN 232/422/485 Firmware FL COMSERVER all versions
2702534 FL WLAN 1100 Firmware FL WLAN <2.21
2702538 FL WLAN 1101 Firmware FL WLAN <2.21
2702535 FL WLAN 2100 Firmware FL WLAN <2.21
2702540 FL WLAN 2101 Firmware FL WLAN <2.21
2884279 FL WLAN 230 AP 802-11 Firmware FL WLAN all versions
2884444 FL WLAN 230 AP 802-11 Firmware FL WLAN all versions
2700452 FL WLAN 230 AP 802-11-US Firmware FL WLAN all versions
2700451 FL WLAN 24 DAP 802-11 Firmware FL WLAN all versions
2884130 FL WLAN 24 EC 802-11 Firmware FL WLAN all versions
2700449 FL WLAN 24 EC 802-11 Firmware FL WLAN all versions
2700718 FL WLAN 5100 Firmware FL WLAN <3.06
2701093 FL WLAN 5101 Firmware FL WLAN <3.06
2701850 FL WLAN 5102 Firmware FL WLAN <3.06
FL WLAN 5110 Firmware FL WLAN <3.06
1043201 FL WLAN 5111 Firmware FL WLAN <3.06
2701169 FL WLAN EPA Firmware FL WLAN all versions
2700488 FL WLAN EPA Firmware FL WLAN all versions
2692791 FL WLAN EPA Firmware FL WLAN all versions
2884761 FL WLAN SPA Firmware FL WLAN all versions
2403485 ITC 8113 Firmware ITC 8113 all versions
2402911 ITC 8113 Firmware ITC 8113 all versions
2403267 ITC 8113 Firmware ITC 8113 all versions
2403738 ITC 8113 Firmware ITC 8113 all versions
2402961 ITC 8113 PW7 Firmware ITC 8113 all versions
2402962 ITC 8113 PW7U Firmware ITC 8113 all versions
2402963 ITC 8113 PWES8 Firmware ITC 8113 all versions
2402964 ITC 8113 PWES8U Firmware ITC 8113 all versions
2402957 ITC 8113 SW7 Firmware ITC 8113 all versions
2402958 ITC 8113 SW7U Firmware ITC 8113 all versions
2402979 ITC 8113 SWES7 Firmware ITC 8113 all versions
2402959 ITC 8113 SWES8 Firmware ITC 8113 all versions
2402960 ITC 8113 SWES8U Firmware ITC 8113 all versions
2900046 RAD-80211-XD Firmware RAD all versions
2900047 RAD-80211-XD Firmware RAD all versions
2990011 RAD-80211-XDB Firmware RAD all versions
2900178 RAD-WHG/WLAN-XD Firmware RAD all versions
2701316 TPC 6013 Firmware TPC 6013 all versions
2913784 TPC 6013 Firmware TPC 6013 all versions
2700740 TPC 6013 Firmware TPC 6013 all versions
2700611 TPC 6013 P Firmware TPC 6013 all versions
2913852 VMT 3008 Firmware VMT 30xx all versions
2700969 VMT 3010 EXP SUN Firmware VMT 30xx all versions
2913959 VMT 3012 Firmware VMT 30xx all versions
2700878 VMT 3012 EXP SUN Firmware VMT 30xx all versions
2701003 VMT 30xx Firmware VMT 30xx all versions
2887580 VMT 5010 Firmware VMT 50xx all versions
2887593 VMT 5012 Firmware VMT 50xx all versions
2913810 VMT 5015 DAF 01 Firmware VMT 50xx all versions
2400161 VMT 7008 Firmware VMT 70xx all versions
2400158 VMT 7010 Firmware VMT 70xx all versions
2400159 VMT 7012 Firmware VMT 70xx all versions
2400160 VMT 7015 Firmware VMT 70xx all versions

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

References

Published
09/22/2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

References

Published
09/22/2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

References

Revision History

Version Date Summary
1 11/09/2017 17:20 Initial revision.
2 11/09/2017 19:00 Updated affected products.
3 09/24/2018 12:00 Updated Solution.
4 11/06/2024 12:27 Fix: correct certvde domain, added self-reference
5 05/14/2025 14:28 Fix: version space, removed ia, version term