Summary
Multiple security issues and vulnerabilities within the WPA2 standard have been identified and publicized by Mr. Mathy Vanhoef of KU Leuven. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point (AP). In consequence, an attacker could establish a man-in-the-middle position between AP and client facilitating packet decryption and injection.
Update A / Revision 2 - 2017-11-09
* Added a detailed list of affected products
Update B / Revision 3 - 2018-09-24
* Added firmware update information, see section "Solution"
Impact
PHOENIX CONTACT embedded devices running in AP mode are not affected by these vulnerabilities. If devices are used in client or repeater mode, an attacker could in theory decrypt any packet sent by the client. Devices of the FL WLAN 110x, 210x, and 510x product families are only affected to a very limited extent. With these devices, only data packets sent within three seconds after key renewal could possibly be decrypted by a successful attacker. In general, if TCP SYN packets are decrypted, this can be used to hijack TCP connections and inject malicious traffic into unencrypted protocols. However, to perform the attack, the attacker must be significantly closer to the WLAN client than the access point. In industrial or indoor applications, the attacker would have to be inside the plant. A successful external attack therefore seems to be very difficult. Furthermore, the WPA2 password cannot be compromised using a KRACK attack. It is not possible for the attacker to gain full access to the network. However, note that if WPA-TKIP is used instead of AES-CCMP, the impact of this vulnerability is much more severe, because an attacker can then not only decrypt packets, but also forge and inject packets directly into the WLAN.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
2404777 | BL2 BPC 1000 | Firmware BL2 all versions |
2404844 | BL2 BPC 2000 | Firmware BL2 all versions |
2404845 | BL2 PPC 1000 | Firmware BL2 all versions |
BL2 PPC 2000 | Firmware BL2 all versions | |
2313559 | FL COMSERVER WLAN 232/422/485 | Firmware FL COMSERVER all versions |
2702534 | FL WLAN 1100 | Firmware FL WLAN <2.21 |
2702538 | FL WLAN 1101 | Firmware FL WLAN <2.21 |
2702535 | FL WLAN 2100 | Firmware FL WLAN <2.21 |
2702540 | FL WLAN 2101 | Firmware FL WLAN <2.21 |
2884279 | FL WLAN 230 AP 802-11 | Firmware FL WLAN all versions |
2884444 | FL WLAN 230 AP 802-11 | Firmware FL WLAN all versions |
2700452 | FL WLAN 230 AP 802-11-US | Firmware FL WLAN all versions |
2700451 | FL WLAN 24 DAP 802-11 | Firmware FL WLAN all versions |
2884130 | FL WLAN 24 EC 802-11 | Firmware FL WLAN all versions |
2700449 | FL WLAN 24 EC 802-11 | Firmware FL WLAN all versions |
2700718 | FL WLAN 5100 | Firmware FL WLAN <3.06 |
2701093 | FL WLAN 5101 | Firmware FL WLAN <3.06 |
2701850 | FL WLAN 5102 | Firmware FL WLAN <3.06 |
FL WLAN 5110 | Firmware FL WLAN <3.06 | |
1043201 | FL WLAN 5111 | Firmware FL WLAN <3.06 |
2701169 | FL WLAN EPA | Firmware FL WLAN all versions |
2700488 | FL WLAN EPA | Firmware FL WLAN all versions |
2692791 | FL WLAN EPA | Firmware FL WLAN all versions |
2884761 | FL WLAN SPA | Firmware FL WLAN all versions |
2403485 | ITC 8113 | Firmware ITC 8113 all versions |
2402911 | ITC 8113 | Firmware ITC 8113 all versions |
2403267 | ITC 8113 | Firmware ITC 8113 all versions |
2403738 | ITC 8113 | Firmware ITC 8113 all versions |
2402961 | ITC 8113 PW7 | Firmware ITC 8113 all versions |
2402962 | ITC 8113 PW7U | Firmware ITC 8113 all versions |
2402963 | ITC 8113 PWES8 | Firmware ITC 8113 all versions |
2402964 | ITC 8113 PWES8U | Firmware ITC 8113 all versions |
2402957 | ITC 8113 SW7 | Firmware ITC 8113 all versions |
2402958 | ITC 8113 SW7U | Firmware ITC 8113 all versions |
2402979 | ITC 8113 SWES7 | Firmware ITC 8113 all versions |
2402959 | ITC 8113 SWES8 | Firmware ITC 8113 all versions |
2402960 | ITC 8113 SWES8U | Firmware ITC 8113 all versions |
2900046 | RAD-80211-XD | Firmware RAD all versions |
2900047 | RAD-80211-XD | Firmware RAD all versions |
2990011 | RAD-80211-XDB | Firmware RAD all versions |
2900178 | RAD-WHG/WLAN-XD | Firmware RAD all versions |
2701316 | TPC 6013 | Firmware TPC 6013 all versions |
2913784 | TPC 6013 | Firmware TPC 6013 all versions |
2700740 | TPC 6013 | Firmware TPC 6013 all versions |
2700611 | TPC 6013 P | Firmware TPC 6013 all versions |
2913852 | VMT 3008 | Firmware VMT 30xx all versions |
2700969 | VMT 3010 EXP SUN | Firmware VMT 30xx all versions |
2913959 | VMT 3012 | Firmware VMT 30xx all versions |
2700878 | VMT 3012 EXP SUN | Firmware VMT 30xx all versions |
2701003 | VMT 30xx | Firmware VMT 30xx all versions |
2887580 | VMT 5010 | Firmware VMT 50xx all versions |
2887593 | VMT 5012 | Firmware VMT 50xx all versions |
2913810 | VMT 5015 DAF 01 | Firmware VMT 50xx all versions |
2400161 | VMT 7008 | Firmware VMT 70xx all versions |
2400158 | VMT 7010 | Firmware VMT 70xx all versions |
2400159 | VMT 7012 | Firmware VMT 70xx all versions |
2400160 | VMT 7015 | Firmware VMT 70xx all versions |
Vulnerabilities
Expand / Collapse allWi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
Revision History
Version | Date | Summary |
---|---|---|
1 | 09.11.2017 17:20 | Initial revision. |
2 | 09.11.2017 19:00 | Updated affected products. |
3 | 24.09.2018 12:00 | Updated Solution. |
4 | 06.11.2024 12:27 | Fix: correct certvde domain, added self-reference |
5 | 14.05.2025 14:28 | Fix: version space, removed ia, version term |