Summary
A vulnerability in the use of hard-coded Platform Keys (PK) within the UEFI framework, known as PKfail, has been discovered in several Pepperl+Fuchs devices.
Impact
An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
70170119 | BTC22-NA-1BA1-NN0 | BIOS <1.01 |
70179516 | BTC22-NA-1BAJ-NN0 | BIOS <1.01 |
70173575 | BTC24-NA-1AA1-NN0 | BIOS <1.01 |
70179517 | BTC24-NA-1AAJ-NN0 | BIOS <1.01 |
70124565 | PC-320* | BIOS <1.02 |
70124565 | RM-320* | BIOS <1.02 |
Vulnerabilities
Expand / Collapse allA vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
Mitigation
Protect the device from unauthorized physical access.
Remediation
Install the appropiate updates from the Pepperl+Fuchs Homepage:
* 18-34761B (BIOS 1.01) for BTC22-
* 18-35033B (BIOS 1.01) for BTC24-
* 18-34132C (BIOS 1.02) for RM-320
* 18-34132C / 18-34133E (BIOS 1.02) for PC320
Acknowledgments
Pepperl+Fuchs SE thanks the following parties for their efforts:
- CERT@VDE for coordination (see https://certvde.com )
- Pepperl+Fuchs SE for reporting (see https://www.pepperl-fuchs.com/cybersecurity )
Revision History
Version | Date | Summary |
---|---|---|
1 | 11/26/2024 12:00 | Initial revision. |
2 | 05/14/2025 14:28 | Fix: version space |