Phoenix Contact is working on a fix to mitigate a reusing a nonce vulnerability in its WLAN capable devices using the WPA2 protocol, according to a report with ICS-CERT.
Successful exploitation of these vulnerabilities could allow an attacker to operate as a “man-in-the-middle” between the device and the wireless access point. Mathy Vanhoef of imec-DistriNet, KU Leuven discovered these vulnerabilities. Phoenix Contact reported these vulnerabilities to CERT@VDE, which coordinated these vulnerabilities with ICS-CERT.
Phoenix Contact reports these vulnerabilities affect all versions of the following WLAN capable devices using the WPA2 Protocol:
• BL2 BPC
• BL2 PPC
• FL COMSERVER WLAN 232/422/485
• FL WLAN 110x
• FL WLAN 210x
• FL WLAN 510x
• FL WLAN 230 AP 802-11
• FL WLAN 24 AP 802-11
• FL WLAN 24 DAP 802-11
• FL WLAN 24 EC 802-11
• FL WLAN EPA
• FL WLAN SPA
• ITC 8113
• TPC 6013
• VMT 30xx
• VMT 50xx
• VMT 70xx
If WPA-TKIP is being used for WLAN configuration, Phoenix Contact recommends the user switch to AES-CCMP immediately.
These vulnerabilities are not remotely exploitable. High skill level is needed to exploit. Public exploits are available.
Multiple products are affected by key reinstallation attacks known as KRACK. The four-way hand shake traffic in the Wi-Fi Protected Access WPA and WPA2 protocol can be manipulated to allow nonce reuse resulting in key reinstallation. This could allow an attacker to execute a “man-in-the-middle” attack, enabling the attacker within radio range to replay, decrypt, or spoof frames.
The following CVEs have been assigned to this group of vulnerabilities:
CVE-2017-13077: reinstallation of the pairwise key in the four-way handshake
CVE-2017-13078: reinstallation of the group key in the four-way handshake
CVE-2017-13080: reinstallation of the group key in the group key handshake
A CVSS v3 base score of 6.8 has been assigned.
The product sees use in the communications, critical manufacturing and the information technology sectors. It also sees action on a global basis.
Germany-based Phoenix Contact reported users operating embedded devices in AP mode are not affected by these vulnerabilities. Phoenix Contact is actively working on discovering how these vulnerabilities affect its products and plans to release future updates as they become available. For more information, please see the advisory.
Phoenix Contact recommends users apply the security update provided by Microsoft at the following location for devices running Microsoft Windows.