Article No° | Product Name | Affected Version(s) |
---|---|---|
BTC22-NA-1BA1-NN0 | < BIOS 1.01 | |
BTC22-NA-1BAJ-NN0 | < BIOS 1.01 | |
BTC24-NA-1AA1-NN0 | < BIOS 1.01 | |
BTC24-NA-1AAJ-NN0 | < BIOS 1.01 | |
PC-320* | < BIOS 1.02 | |
RM-320* | < BIOS 1.02 |
A vulnerability in the use of hard-coded Platform Keys (PK) within the UEFI framework, known as PKfail, has been discovered in several Pepperl+Fuchs devices.
A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
Mitigation
Protect the device from unauthorized physical access.
Remediation
Install the appropiate updates from the Pepperl+Fuchs Homepage:
CERT@VDE coordinated with Pepperl+Fuchs SE