Article No° | Product Name | Affected Version(s) |
---|---|---|
CT50-Ex | <= current version | |
Cx70-Ex | <= current version | |
Ex-Handy 09 | <= current version | |
Ex-Handy 209 | <= current version | |
i.roc Ci70-Ex | <= current version | |
Pad-Ex 01 | <= current version | |
Smart-Ex 01 | <= current version | |
Smart-Ex 201 | <= current version | |
Tab-Ex 01 | <= current version |
Critical vulnerabilities within several CPUs have been identified by security researchers. These hardware vulnerabilities allow programs to learn about the contents of a system's memory, using side-channel attacks. Potential attack vectors against these vulnerabilities have been published and dubbed Meltdown and Spectre. While programs are typically not permitted to read data from the OS kernel or from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in kernel memory or the memory of other programs executed on the same CPU. As a consequence, an exploit could allow attackers to get access to any sensitive data, including passwords or cryptographic keys.
Pepperl+Fuchs analyzed ecom Instruments devices in respect of Meltdown and Spectre attacks. To our current knowledge only i.roc Ci70-Ex, Cx70-Ex, CT50-Ex, Pad-Ex 01, Tab-Ex 01, Smart-Ex 01, Smart-Ex 201, Ex-Handy 09, Ex-Handy 209 are potentially affected by these vulnerabilities.
In order to exploit these vulnerabilities, an attacker needs to be able to execute arbitrary code on the CPU of the target system.
ecom mobile devices are normally used in the corporate network. This implies that outgoing connections and local software installations have to be configured by administrators. If these steps are taken, this greatly reduces the risk of unwittingly accessing malicious content and executing unknown code, e.g. by accessing a website that was prepared by an attacker.
However, if a malicious website is accessed, an attacker could gain knowledge of all data in the memory of the mobile device, including passwords.
23.10.2018, Update A: Firmware for Android based devices now available
Android
Pepperl+Fuchs has released firmware updates for the following products
Product |
Date |
Updatesource |
Smart-Ex 01 |
Available since 09/2018 |
FOTA-Update |
Smart-Ex 201 |
Available since 10/2018 |
FOTA-Update |
Microsoft Windows
Customers using ecom mobile devices out of i.roc Ci70-Ex, Cx70-Ex, CT50-Ex, Pad-Ex 01 product families should follow these guidelines:
Please note that Microsoft Security patches directly affect machine code execution on the CPU. Be aware of installing these patches, because they might have an impact on system performance or system stability.
This advisory will be updated as further details and/or software updates become available.
Jann Horn (Google Project Zero), Werner Haas, Thomas Prescher (Cyberus Technology), Daniel Gruss, Moritz Lipp, Stefan Mangard, Michael Schwarz (Graz University of Technology) published the attack on https://meltdownattack.com/
Jann Horn (Google Project Zero) and Paul Kocher, Daniel Genkin (University of Pennsylvania and University of Maryland), Mike Hamburg (Rambus), Moritz Lipp (Graz University of Technology), and Yuval Yarom (University of Adelaide and Data61) published the attack on https://meltdownattack.com/