Zurück zur Übersicht

Pepperl+Fuchs / ecom instruments: WLAN enabled products utilizing WPA2 encryption

VDE-2017-005
Last update
23.10.2018 12:00
Published at
11.12.2017 14:26
Vendor(s)
Pepperl+Fuchs SE
External ID
VDE-2017-005
CSAF Document

Summary

Multiple security issues and vulnerabilities within the WPA2 standard have been identified and publicized by Mr. Mathy Vanhoef of KU Leuven. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point (AP). In consequence, an attacker could establish a man-in-the-middle position between AP and client facilitating packet decryption and injection.

ecom instruments is a subsidiary company of PEPPERL+FUCHS.

Impact

ecom instruments devices are in theory attackable by replay, decryption and forging of packets. However, to perform the attack, the attacker must be significantly closer to the ecom device than to the access point. The WPA2 password cannot be compromised using a KRACK attack. Note if WPA-TKIP is used instead of AES-CCMP, an attacker can easily forge and inject packets directly into the WLAN.

Affected Product(s)

Model no. Product name Affected versions
CK70A-ATEX vers:all/* CK70A-ATEX vers:all/*
CK71A-ATEX vers:all/* CK71A-ATEX vers:all/*
CN70A-ATEX vers:all/* CN70A-ATEX vers:all/*
CN70E-ATEX vers:all/* CN70E-ATEX vers:all/*
Ex-Handy 09 vers:all/* Ex-Handy 09 vers:all/*
Ex-Handy 209 vers:all/* Ex-Handy 209 vers:all/*
Pad-Ex 01 vers:all/* Pad-Ex 01 vers:all/*
Smart-Ex 01 vers:all/* Smart-Ex 01 vers:all/*
Smart-Ex 201 vers:all/* Smart-Ex 201 vers:all/*
Tab-Ex 01 vers:all/* Tab-Ex 01 vers:all/*
i.roc Ci70-Ex vers:all/* i.roc Ci70-Ex vers:all/*

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

References

Published
22.09.2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

References

Published
22.09.2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

References

Published
22.09.2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.

References

Published
22.09.2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.

References

Published
22.09.2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

References

Published
22.09.2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

References

Published
22.09.2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

References

Published
22.09.2025 14:58
Weakness
Use of Insufficiently Random Values (CWE-330)
Summary

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

References

Remediation

Android

Affected Products:
Tab-Ex 01, Ex-Handy 09, Ex-Handy 209, Smart-Ex 01, Smart-Ex 201

Pepperl+Fuchs has released firmware updates for the following products:

Product Date Update Source
Smart-Ex 01 Available since 09/2018 FOTA-Update
Smart-Ex 201 Available since 10/2018 FOTA-Update

Windows

Affected Products:
Pad-Ex 01, i.roc Ci70-Ex, CK70A-ATEX, CK71A-ATEX, CN70A-ATEX, CN70E-ATEX

For ecom instruments devices running Windows, we recommend to apply the security update provided by Microsoft.
If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.

Note:
This advisory will be updated as further details and/or software updates become available.

Revision History

Version Date Summary
1.0.0 11.12.2017 14:26 Initial revision.
1.1.0 23.10.2018 12:00 Firmware for Android based devices now available.