Fix for Pepperl+Fuchs/ecom Instruments

Tuesday, December 19, 2017 @ 04:12 PM gHale

Pepperl+Fuchs/ecom instruments released mitigations to fix a reusing a nonce vulnerability in it’s WLAN capable devices using the WPA2 Protocol, according to a report with ICS-CERT.

Successful exploitation of these vulnerabilities could allow an attacker to operate as a “man-in-the-middle” between the device and the wireless access point.

RELATED STORIES
WECON Software Fixes HMI Issue
Hole in Xiongmai IP Cameras, DVRs
New Firmware Fixes Phoenix Contact X-SS Hole
Rockwell Fixes FactoryTalk Hole

Public exploits are available. An attacker with low skill level could leverage the vulnerability.

Mathy Vanhoef of imec-DistriNet, KU Leuven discovered these vulnerabilities. PEPPERL+FUCHS reported to CERT@VDE their products are affected. CERT@VDE coordinated these vulnerabilities with ICS-CERT.

Pepperl+Fuchs/ecom instruments said these vulnerabilities affect all versions of the following WLAN capable devices using the WPA2 Protocol:
• Tab-Ex 01
• Ex-Handy 09
• Ex-Handy 209
• Smart-Ex 01
• Smart-Ex 201
• Pad-Ex 01
• i.roc Ci70-Ex
• CK70A-ATEX
• CK71A-ATEX
• CN70A-ATEX
• CN70E-ATEX

Multiple products are affected by key reinstallation attacks known as KRACK. The four-way hand shake traffic in the Wi-Fi Protected Access WPA and WPA2 protocol can be manipulated to allow nonce reuse resulting in key reinstallation. This could allow an attacker to execute a “man-in-the-middle” attack, enabling the attacker within radio range to replay, decrypt, or spoof frames.

The following CVEs have been assigned to this group of vulnerabilities:

CVE-2017-13077: Reinstallation of the pairwise key during the four-way handshake.
CVE-2017-13078: Reinstallation of the group key during the four-way handshake.
CVE-2017-13079: Reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake.
CVE-2017-13080: Reinstallation of the group key during the group key handshake.
CVE-2017-13081: Reinstallation of the IGTK during the group key handshake.
CVE-2017-13082: Reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake.
CVE-2017-13086: Reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake.
CVE-2017-13087: Reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.
CVE-2017-13088: Reinstallation of the IGTK when processing a WNM Sleep Mode Response frame.
A CVSS v3 base score of 8.1 has been assigned.

The products see use mainly in the communications, critical manufacturing and information technology sectors. They also see action on a global basis.

Germany-based Pepperl+Fuchs/ecom instruments report the following mitigations:

Android
• Affected Products: Tab-Ex 01, Ex-Handy 09, Ex-Handy 209, Smart-Ex 01, Smart-Ex 201
• ecom instruments is actively working on these vulnerabilities. This advisory will updated as soon as further significant details are provided by the vendor, with an emphasis on information about available patches.

Windows
• Affected Products: Pad-Ex 01, i.roc Ci70-Ex, CK70A-ATEX, CK71A-ATEX, CN70A-ATEX, CN70E-ATEX
• For ecom instruments devices running Windows, ecom instruments recommends users apply the security update provided by Microsoft. If users are using WPA-TKIP in their WLAN, users should switch to AES-CCMP immediately.

For more information CERT@VDE released a security advisory.



Leave a Reply

You must be logged in to post a comment.