VDE-2017-003
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2017-11-09 16:20 - Updated: 2025-05-14 12:28Summary
PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption
Notes
Summary: Multiple security issues and vulnerabilities within the WPA2 standard have been identified and publicized by Mr. Mathy Vanhoef of KU Leuven. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point (AP). In consequence, an attacker could establish a man-in-the-middle position between AP and client facilitating packet decryption and injection.
Update A / Revision 2 - 2017-11-09
* Added a detailed list of affected products
Update B / Revision 3 - 2018-09-24
* Added firmware update information, see section "Solution"
Impact: PHOENIX CONTACT embedded devices running in AP mode are not affected by these vulnerabilities. If devices are used in client or repeater mode, an attacker could in theory decrypt any packet sent by the client. Devices of the FL WLAN 110x, 210x, and 510x product families are only affected to a very limited extent. With these devices, only data packets sent within three seconds after key renewal could possibly be decrypted by a successful attacker. In general, if TCP SYN packets are decrypted, this can be used to hijack TCP connections and inject malicious traffic into unencrypted protocols. However, to perform the attack, the attacker must be significantly closer to the WLAN client than the access point. In industrial or indoor applications, the attacker would have to be inside the plant. A successful external attack therefore seems to be very difficult. Furthermore, the WPA2 password cannot be compromised using a KRACK attack. It is not possible for the attacker to gain full access to the network. However, note that if WPA-TKIP is used instead of AES-CCMP, the impact of this vulnerability is much more severe, because an attacker can then not only decrypt packets, but also forge and inject packets directly into the WLAN.
Remediation / Solution: PHOENIX CONTACT is actively working on these vulnerabilities. CERT@VDE will update this advisory as soon as further significant details are provided by the vendor, especially with information about patches provided.
For PHOENIX CONTACT devices running Microsoft Windows, we recommend to apply the security update provided by Microsoft external link. If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.
This advisory will be updated as further details become available.
For the following products a firmware update addressing the issues is available for download on the Download tab of the corresponding product page on our website:
Products: FL EPA 2, FL EPA 2 RSMA
Fixed Firmware: 1.53 or higher
Released: 06/2018
Products: FL WLAN 5100, FL WLAN 5101, FL WLAN 5102, FL WLAN 5110, FL WLAN 5111
Fixed Firmware: FW 3.06 or higher
Released: 06/2018
Products: FL WLAN 1100, FL WLAN 1101, FL WLAN 2100, FL WLAN 2101
Fixed Firmware: FW 2.21 or higher
Released: 06/2018
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
6.8 (Medium)
Vendor Fix
PHOENIX CONTACT is actively working on these vulnerabilities. CERT@VDE will update this advisory as soon as further significant details are provided by the vendor, especially with information about patches provided.
For PHOENIX CONTACT devices running Microsoft Windows, we recommend to apply the security update provided by Microsoft external link. If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.
This advisory will be updated as further details become available.
For the following products a firmware update addressing the issues is available for download on the Download tab of the corresponding product page on our website:
Products: FL EPA 2, FL EPA 2 RSMA
Fixed Firmware: 1.53 or higher
Released: 06/2018
Products: FL WLAN 5100, FL WLAN 5101, FL WLAN 5102, FL WLAN 5110, FL WLAN 5111
Fixed Firmware: FW 3.06 or higher
Released: 06/2018
Products: FL WLAN 1100, FL WLAN 1101, FL WLAN 2100, FL WLAN 2101
Fixed Firmware: FW 2.21 or higher
Released: 06/2018
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
5.3 (Medium)
Vendor Fix
PHOENIX CONTACT is actively working on these vulnerabilities. CERT@VDE will update this advisory as soon as further significant details are provided by the vendor, especially with information about patches provided.
For PHOENIX CONTACT devices running Microsoft Windows, we recommend to apply the security update provided by Microsoft external link. If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.
This advisory will be updated as further details become available.
For the following products a firmware update addressing the issues is available for download on the Download tab of the corresponding product page on our website:
Products: FL EPA 2, FL EPA 2 RSMA
Fixed Firmware: 1.53 or higher
Released: 06/2018
Products: FL WLAN 5100, FL WLAN 5101, FL WLAN 5102, FL WLAN 5110, FL WLAN 5111
Fixed Firmware: FW 3.06 or higher
Released: 06/2018
Products: FL WLAN 1100, FL WLAN 1101, FL WLAN 2100, FL WLAN 2101
Fixed Firmware: FW 2.21 or higher
Released: 06/2018
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
5.3 (Medium)
Vendor Fix
PHOENIX CONTACT is actively working on these vulnerabilities. CERT@VDE will update this advisory as soon as further significant details are provided by the vendor, especially with information about patches provided.
For PHOENIX CONTACT devices running Microsoft Windows, we recommend to apply the security update provided by Microsoft external link. If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.
This advisory will be updated as further details become available.
For the following products a firmware update addressing the issues is available for download on the Download tab of the corresponding product page on our website:
Products: FL EPA 2, FL EPA 2 RSMA
Fixed Firmware: 1.53 or higher
Released: 06/2018
Products: FL WLAN 5100, FL WLAN 5101, FL WLAN 5102, FL WLAN 5110, FL WLAN 5111
Fixed Firmware: FW 3.06 or higher
Released: 06/2018
Products: FL WLAN 1100, FL WLAN 1101, FL WLAN 2100, FL WLAN 2101
Fixed Firmware: FW 2.21 or higher
Released: 06/2018
References
Acknowledgments
CERT@VDE
certvde.com
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Mathy Vanhoef"
],
"organization": "imec-DistriNet, KU Leuven",
"summary": "discovery",
"urls": [
"https://distrinet.cs.kuleuven.be/",
"https://twitter.com/vanhoefm"
]
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Multiple security issues and vulnerabilities within the WPA2 standard have been identified and publicized by Mr. Mathy Vanhoef of KU Leuven. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point (AP). In consequence, an attacker could establish a man-in-the-middle position between AP and client facilitating packet decryption and injection.\n\nUpdate A / Revision 2 - 2017-11-09\n* Added a detailed list of affected products\n\nUpdate B / Revision 3 - 2018-09-24\n* Added firmware update information, see section \"Solution\"",
"title": "Summary"
},
{
"category": "description",
"text": "PHOENIX CONTACT embedded devices running in AP mode are not affected by these vulnerabilities. If devices are used in client or repeater mode, an attacker could in theory decrypt any packet sent by the client. Devices of the FL WLAN 110x, 210x, and 510x product families are only affected to a very limited extent. With these devices, only data packets sent within three seconds after key renewal could possibly be decrypted by a successful attacker. In general, if TCP SYN packets are decrypted, this can be used to hijack TCP connections and inject malicious traffic into unencrypted protocols. However, to perform the attack, the attacker must be significantly closer to the WLAN client than the access point. In industrial or indoor applications, the attacker would have to be inside the plant. A successful external attack therefore seems to be very difficult. Furthermore, the WPA2 password cannot be compromised using a KRACK attack. It is not possible for the attacker to gain full access to the network. However, note that if WPA-TKIP is used instead of AES-CCMP, the impact of this vulnerability is much more severe, because an attacker can then not only decrypt packets, but also forge and inject packets directly into the WLAN.",
"title": "Impact"
},
{
"category": "description",
"text": "PHOENIX CONTACT is actively working on these vulnerabilities. CERT@VDE will update this advisory as soon as further significant details are provided by the vendor, especially with information about patches provided.\n\nFor PHOENIX CONTACT devices running Microsoft Windows, we recommend to apply the security update provided by Microsoft external link. If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\n\nThis advisory will be updated as further details become available.\n\nFor the following products a firmware update addressing the issues is available for download on the Download tab of the corresponding product page on our website:\n\nProducts: FL EPA 2, FL EPA 2 RSMA\t\nFixed Firmware: 1.53 or higher\t\nReleased: 06/2018\n\nProducts: FL WLAN 5100, FL WLAN 5101, FL WLAN 5102, FL WLAN 5110, FL WLAN 5111\nFixed Firmware: FW 3.06 or higher\nReleased: 06/2018\n\nProducts: FL WLAN 1100, FL WLAN 1101, FL WLAN 2100, FL WLAN 2101\nFixed Firmware: FW 2.21 or higher\nReleased: 06/2018",
"title": "Remediation / Solution"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "Phoenix Contact PSIRT",
"url": "https://www.phoenixcontact.com/de-de/service-und-support/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Phoenix Contact",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2017-003: PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption - HTML",
"url": "https://certvde.com/en/advisories/VDE-2017-003/"
},
{
"category": "self",
"summary": "VDE-2017-003: PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2017/vde-2017-003.json"
}
],
"title": "PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption",
"tracking": {
"aliases": [
"VDE-2017-003"
],
"current_release_date": "2025-05-14T12:28:19.000Z",
"generator": {
"date": "2024-06-17T12:30:53.865Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.4"
}
},
"id": "VDE-2017-003",
"initial_release_date": "2017-11-09T16:20:00.000Z",
"revision_history": [
{
"date": "2017-11-09T16:20:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2017-11-09T18:00:00.000Z",
"number": "2",
"summary": "Updated affected products."
},
{
"date": "2018-09-24T10:00:00.000Z",
"number": "3",
"summary": "Updated Solution."
},
{
"date": "2024-11-06T11:27:01.000Z",
"number": "4",
"summary": "Fix: correct certvde domain, added self-reference"
},
{
"date": "2025-05-14T12:28:19.000Z",
"number": "5",
"summary": "Fix: version space, removed ia, version term"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "BL2 BPC 1000",
"product": {
"name": "BL2 BPC 1000",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"2404777"
]
}
}
},
{
"category": "product_name",
"name": "PBL2 PC 1000",
"product": {
"name": "BL2 PPC 1000",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2404845"
]
}
}
},
{
"category": "product_name",
"name": "BL2 BPC 2000",
"product": {
"name": "BL2 BPC 2000",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"2404844"
]
}
}
},
{
"category": "product_name",
"name": "BL2 PPC 2000",
"product": {
"name": "BL2 PPC 2000",
"product_id": "CSAFPID-11004"
}
}
],
"category": "product_family",
"name": "BL2"
},
{
"branches": [
{
"category": "product_name",
"name": "FL COMSERVER WLAN 232/422/485",
"product": {
"name": "FL COMSERVER WLAN 232/422/485",
"product_id": "CSAFPID-11005",
"product_identification_helper": {
"model_numbers": [
"2313559"
]
}
}
}
],
"category": "product_family",
"name": "FL COMSERVER"
},
{
"branches": [
{
"category": "product_name",
"name": "FL WLAN 1100",
"product": {
"name": "FL WLAN 1100",
"product_id": "CSAFPID-11006",
"product_identification_helper": {
"model_numbers": [
"2702534"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 1101",
"product": {
"name": "FL WLAN 1101",
"product_id": "CSAFPID-11007",
"product_identification_helper": {
"model_numbers": [
"2702538"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 2100",
"product": {
"name": "FL WLAN 2100",
"product_id": "CSAFPID-11008",
"product_identification_helper": {
"model_numbers": [
"2702535"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 2101",
"product": {
"name": "FL WLAN 2101",
"product_id": "CSAFPID-11009",
"product_identification_helper": {
"model_numbers": [
"2702540"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 5100",
"product": {
"name": "FL WLAN 5100",
"product_id": "CSAFPID-11010",
"product_identification_helper": {
"model_numbers": [
"2700718"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 5101",
"product": {
"name": "FL WLAN 5101",
"product_id": "CSAFPID-11011",
"product_identification_helper": {
"model_numbers": [
"2701093"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 5110",
"product": {
"name": "FL WLAN 5110",
"product_id": "CSAFPID-11059"
}
},
{
"category": "product_name",
"name": "FL WLAN 5111",
"product": {
"name": "FL WLAN 5111",
"product_id": "CSAFPID-11060",
"product_identification_helper": {
"model_numbers": [
"1043201"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 5102",
"product": {
"name": "FL WLAN 5102",
"product_id": "CSAFPID-11012",
"product_identification_helper": {
"model_numbers": [
"2701850"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 230 AP 802-11*",
"product": {
"name": "FL WLAN 230 AP 802-11",
"product_id": "CSAFPID-11013",
"product_identification_helper": {
"model_numbers": [
"2884444"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 230 AP 802-11-US",
"product": {
"name": "FL WLAN 230 AP 802-11-US",
"product_id": "CSAFPID-11014",
"product_identification_helper": {
"model_numbers": [
"2700452"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 230 AP 802-11*",
"product": {
"name": "FL WLAN 230 AP 802-11",
"product_id": "CSAFPID-11015",
"product_identification_helper": {
"model_numbers": [
"2884279"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 24 DAP 802-11",
"product": {
"name": "FL WLAN 24 DAP 802-11",
"product_id": "CSAFPID-11016",
"product_identification_helper": {
"model_numbers": [
"2700451"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 24 EC 802-11",
"product": {
"name": "FL WLAN 24 EC 802-11",
"product_id": "CSAFPID-11017",
"product_identification_helper": {
"model_numbers": [
"2884130"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN 24 EC 802-11",
"product": {
"name": "FL WLAN 24 EC 802-11",
"product_id": "CSAFPID-11018",
"product_identification_helper": {
"model_numbers": [
"2700449"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN EPA",
"product": {
"name": "FL WLAN EPA",
"product_id": "CSAFPID-11019",
"product_identification_helper": {
"model_numbers": [
"2692791"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN EPA 5N",
"product": {
"name": "FL WLAN EPA",
"product_id": "CSAFPID-11020",
"product_identification_helper": {
"model_numbers": [
"2700488"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN EPA RSMA",
"product": {
"name": "FL WLAN EPA",
"product_id": "CSAFPID-11021",
"product_identification_helper": {
"model_numbers": [
"2701169"
]
}
}
},
{
"category": "product_name",
"name": "FL WLAN SPA",
"product": {
"name": "FL WLAN SPA",
"product_id": "CSAFPID-11022",
"product_identification_helper": {
"model_numbers": [
"2884761"
]
}
}
}
],
"category": "product_family",
"name": "FL WLAN"
},
{
"branches": [
{
"category": "product_name",
"name": "ITC 8113",
"product": {
"name": "ITC 8113",
"product_id": "CSAFPID-11023",
"product_identification_helper": {
"model_numbers": [
"2403738"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113",
"product": {
"name": "ITC 8113",
"product_id": "CSAFPID-11024",
"product_identification_helper": {
"model_numbers": [
"2403485"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113",
"product": {
"name": "ITC 8113",
"product_id": "CSAFPID-11025",
"product_identification_helper": {
"model_numbers": [
"2402911"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113",
"product": {
"name": "ITC 8113",
"product_id": "CSAFPID-11026",
"product_identification_helper": {
"model_numbers": [
"2403267"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113 SWES7",
"product": {
"name": "ITC 8113 SWES7",
"product_id": "CSAFPID-11027",
"product_identification_helper": {
"model_numbers": [
"2402979"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113 SW7",
"product": {
"name": "ITC 8113 SW7",
"product_id": "CSAFPID-11028",
"product_identification_helper": {
"model_numbers": [
"2402957"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113 SW7U",
"product": {
"name": "ITC 8113 SW7U",
"product_id": "CSAFPID-11029",
"product_identification_helper": {
"model_numbers": [
"2402958"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113 SWES8",
"product": {
"name": "ITC 8113 SWES8",
"product_id": "CSAFPID-11030",
"product_identification_helper": {
"model_numbers": [
"2402959"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113 SWES8U",
"product": {
"name": "ITC 8113 SWES8U",
"product_id": "CSAFPID-11031",
"product_identification_helper": {
"model_numbers": [
"2402960"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113 PW7",
"product": {
"name": "ITC 8113 PW7",
"product_id": "CSAFPID-11032",
"product_identification_helper": {
"model_numbers": [
"2402961"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113 PW7U",
"product": {
"name": "ITC 8113 PW7U",
"product_id": "CSAFPID-11033",
"product_identification_helper": {
"model_numbers": [
"2402962"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113 PWES8",
"product": {
"name": "ITC 8113 PWES8",
"product_id": "CSAFPID-11034",
"product_identification_helper": {
"model_numbers": [
"2402963"
]
}
}
},
{
"category": "product_name",
"name": "ITC 8113 PWES8U",
"product": {
"name": "ITC 8113 PWES8U",
"product_id": "CSAFPID-11035",
"product_identification_helper": {
"model_numbers": [
"2402964"
]
}
}
}
],
"category": "product_family",
"name": "ITC 8113"
},
{
"branches": [
{
"category": "product_name",
"name": "RAD-80211-XD",
"product": {
"name": "RAD-80211-XD",
"product_id": "CSAFPID-11036",
"product_identification_helper": {
"model_numbers": [
"2885728"
]
}
}
},
{
"category": "product_name",
"name": "RAD-80211-XD",
"product": {
"name": "RAD-80211-XD",
"product_id": "CSAFPID-11037",
"product_identification_helper": {
"model_numbers": [
"2900046"
]
}
}
},
{
"category": "product_name",
"name": "RAD-80211-XD",
"product": {
"name": "RAD-80211-XD",
"product_id": "CSAFPID-11038",
"product_identification_helper": {
"model_numbers": [
"2900047"
]
}
}
},
{
"category": "product_name",
"name": "RAD-80211-XDB",
"product": {
"name": "RAD-80211-XDB",
"product_id": "CSAFPID-11039",
"product_identification_helper": {
"model_numbers": [
"2990011"
]
}
}
},
{
"category": "product_name",
"name": "RAD-WHG/WLAN-XD",
"product": {
"name": "RAD-WHG/WLAN-XD",
"product_id": "CSAFPID-11040",
"product_identification_helper": {
"model_numbers": [
"2900178"
]
}
}
}
],
"category": "product_family",
"name": "RAD"
},
{
"branches": [
{
"category": "product_name",
"name": "TPC 6013",
"product": {
"name": "TPC 6013",
"product_id": "CSAFPID-11041",
"product_identification_helper": {
"model_numbers": [
"2913784"
]
}
}
},
{
"category": "product_name",
"name": "TPC 6013",
"product": {
"name": "TPC 6013",
"product_id": "CSAFPID-11042",
"product_identification_helper": {
"model_numbers": [
"2700740"
]
}
}
},
{
"category": "product_name",
"name": "TPC 6013 P",
"product": {
"name": "TPC 6013 P",
"product_id": "CSAFPID-11043",
"product_identification_helper": {
"model_numbers": [
"2700611"
]
}
}
},
{
"category": "product_name",
"name": "TPC 6013",
"product": {
"name": "TPC 6013",
"product_id": "CSAFPID-11044",
"product_identification_helper": {
"model_numbers": [
"2701316"
]
}
}
}
],
"category": "product_family",
"name": "TPC"
},
{
"branches": [
{
"category": "product_name",
"name": "VMT 3008",
"product": {
"name": "VMT 3008",
"product_id": "CSAFPID-11045",
"product_identification_helper": {
"model_numbers": [
"2913852"
]
}
}
},
{
"category": "product_name",
"name": "VMT 30xx",
"product": {
"name": "VMT 30xx",
"product_id": "CSAFPID-11046",
"product_identification_helper": {
"model_numbers": [
"2701003"
]
}
}
},
{
"category": "product_name",
"name": "VMT 3010 EXP SUN",
"product": {
"name": "VMT 3010 EXP SUN",
"product_id": "CSAFPID-11047",
"product_identification_helper": {
"model_numbers": [
"2700969"
]
}
}
},
{
"category": "product_name",
"name": "VMT 3012",
"product": {
"name": "VMT 3012",
"product_id": "CSAFPID-11048",
"product_identification_helper": {
"model_numbers": [
"2913959"
]
}
}
},
{
"category": "product_name",
"name": "VMT 3012 EXP SUN",
"product": {
"name": "VMT 3012 EXP SUN",
"product_id": "CSAFPID-11049",
"product_identification_helper": {
"model_numbers": [
"2700878"
]
}
}
}
],
"category": "product_family",
"name": "VMT 30xx"
},
{
"branches": [
{
"category": "product_name",
"name": "VMT 5010",
"product": {
"name": "VMT 5010",
"product_id": "CSAFPID-11050",
"product_identification_helper": {
"model_numbers": [
"2887580"
]
}
}
},
{
"category": "product_name",
"name": "VMT 5012",
"product": {
"name": "VMT 5012",
"product_id": "CSAFPID-11051",
"product_identification_helper": {
"model_numbers": [
"2887593"
]
}
}
},
{
"category": "product_name",
"name": "VMT 5015 DAF 01",
"product": {
"name": "VMT 5015 DAF 01",
"product_id": "CSAFPID-11052",
"product_identification_helper": {
"model_numbers": [
"2913810"
]
}
}
}
],
"category": "product_family",
"name": "VMT 50xx"
},
{
"branches": [
{
"category": "product_name",
"name": "VMT 7010",
"product": {
"name": "VMT 7010",
"product_id": "CSAFPID-11053",
"product_identification_helper": {
"model_numbers": [
"2400158"
]
}
}
},
{
"category": "product_name",
"name": "VMT 7012",
"product": {
"name": "VMT 7012",
"product_id": "CSAFPID-11054",
"product_identification_helper": {
"model_numbers": [
"2400159"
]
}
}
},
{
"category": "product_name",
"name": "VMT 7015",
"product": {
"name": "VMT 7015",
"product_id": "CSAFPID-11055",
"product_identification_helper": {
"model_numbers": [
"2400160"
]
}
}
},
{
"category": "product_name",
"name": "VMT 7008",
"product": {
"name": "VMT 7008",
"product_id": "CSAFPID-11056",
"product_identification_helper": {
"model_numbers": [
"2400161"
]
}
}
}
],
"category": "product_family",
"name": "VMT 70xx"
},
{
"branches": [
{
"category": "product_name",
"name": "FL EPA 2",
"product": {
"name": "FL EPA 2",
"product_id": "CSAFPID-11057",
"product_identification_helper": {
"model_numbers": [
"1005955"
]
}
}
},
{
"category": "product_name",
"name": "FL EPA 2 RSMA",
"product": {
"name": "FL EPA 2 RSMA",
"product_id": "CSAFPID-11058",
"product_identification_helper": {
"model_numbers": [
"1005957"
]
}
}
}
],
"category": "product_family",
"name": "FL EPA 2"
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware BL2 all versions",
"product_id": "CSAFPID-21101"
}
}
],
"category": "product_family",
"name": "BL2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware FL COMSERVER all versions",
"product_id": "CSAFPID-21102"
}
}
],
"category": "product_family",
"name": "FL COMSERVER"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware FL WLAN all versions",
"product_id": "CSAFPID-21103"
}
},
{
"category": "product_version_range",
"name": "\u003c2.21",
"product": {
"name": "Firmware FL WLAN \u003c2.21",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version",
"name": "2.21",
"product": {
"name": "Firmware FL WLAN 2.21",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version_range",
"name": "\u003c3.06",
"product": {
"name": "Firmware FL WLAN \u003c3.06",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version",
"name": "3.06",
"product": {
"name": "Firmware FL WLAN 3.06",
"product_id": "CSAFPID-22002"
}
}
],
"category": "product_family",
"name": "FL WLAN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware ITC 8113 all versions",
"product_id": "CSAFPID-21104"
}
}
],
"category": "product_family",
"name": "ITC 8113"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware RAD all versions",
"product_id": "CSAFPID-21105"
}
}
],
"category": "product_family",
"name": "RAD"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware TPC 6013 all versions",
"product_id": "CSAFPID-21106"
}
}
],
"category": "product_family",
"name": "TPC 6013"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware VMT 30xx all versions",
"product_id": "CSAFPID-21107"
}
}
],
"category": "product_family",
"name": "VMT 30xx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware VMT 50xx all versions",
"product_id": "CSAFPID-21108"
}
}
],
"category": "product_family",
"name": "VMT 50xx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware VMT 70xx all versions",
"product_id": "CSAFPID-21109"
}
}
],
"category": "product_family",
"name": "VMT 70xx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.53",
"product": {
"name": "Firmware FL EPA 2 \u003c1.53",
"product_id": "CSAFPID-21003"
}
},
{
"category": "product_version",
"name": "1.53",
"product": {
"name": "Firmware FL EPA 2 1.53",
"product_id": "CSAFPID-22003"
}
}
],
"category": "product_family",
"name": "FL EPA 2"
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "Phoenix Contact"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31059",
"CSAFPID-31058"
],
"summary": "Affected Products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011"
],
"summary": "Fixed Products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware BL2 all versions installed on BL2 BPC 1000",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21101",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware BL2 all versions installed on BL2 PPC 1000",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21101",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware BL2 all versions installed on BL2 BPC 2000",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21101",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware BL2 all versions installed on BL2 PPC 2000",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21101",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL COMSERVER all versions installed on FL COMSERVER WLAN 232/422/485",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21102",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN \u003c2.21 installed on FL WLAN 1100",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN \u003c2.21 installed on FL WLAN 1101",
"product_id": "CSAFPID-31007"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN \u003c2.21 installed on FL WLAN 2100",
"product_id": "CSAFPID-31008"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN \u003c2.21 installed on FL WLAN 2101",
"product_id": "CSAFPID-31009"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN \u003c3.06 installed on FL WLAN 5100",
"product_id": "CSAFPID-31010"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN \u003c3.06 installed on FL WLAN 5101",
"product_id": "CSAFPID-31011"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN \u003c3.06 installed on FL WLAN 5102",
"product_id": "CSAFPID-31012"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN \u003c3.06 installed on FL WLAN 5110",
"product_id": "CSAFPID-31013"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11059"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN \u003c3.06 installed on FL WLAN 5111",
"product_id": "CSAFPID-31014"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11060"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN 230 AP 802-11",
"product_id": "CSAFPID-31015"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11013"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN 230 AP 802-11-US",
"product_id": "CSAFPID-31016"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11014"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN 230 AP 802-11",
"product_id": "CSAFPID-31017"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11015"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN 24 DAP 802-11",
"product_id": "CSAFPID-31018"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11016"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN 24 EC 802-11",
"product_id": "CSAFPID-31019"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11017"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN 24 EC 802-11",
"product_id": "CSAFPID-31020"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11018"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN EPA",
"product_id": "CSAFPID-31021"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11019"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN EPA",
"product_id": "CSAFPID-31022"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11020"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN EPA",
"product_id": "CSAFPID-31023"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11021"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN all versions installed on FL WLAN SPA",
"product_id": "CSAFPID-31024"
},
"product_reference": "CSAFPID-21103",
"relates_to_product_reference": "CSAFPID-11022"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113",
"product_id": "CSAFPID-31025"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11023"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113",
"product_id": "CSAFPID-31026"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11024"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113",
"product_id": "CSAFPID-31027"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11025"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113",
"product_id": "CSAFPID-31028"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11026"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 SWES7",
"product_id": "CSAFPID-31029"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11027"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 SW7",
"product_id": "CSAFPID-31030"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11028"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 SW7U",
"product_id": "CSAFPID-31031"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11029"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 SWES8",
"product_id": "CSAFPID-31032"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11030"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 SWES8",
"product_id": "CSAFPID-31033"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11030"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 SWES8U",
"product_id": "CSAFPID-31034"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11031"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 PW7",
"product_id": "CSAFPID-31035"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11032"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 PW7U",
"product_id": "CSAFPID-31036"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11033"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 PWES8",
"product_id": "CSAFPID-31037"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11034"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware ITC 8113 all versions installed on ITC 8113 PWES8U",
"product_id": "CSAFPID-31038"
},
"product_reference": "CSAFPID-21104",
"relates_to_product_reference": "CSAFPID-11035"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware RAD all versions installed on RAD-80211-XD",
"product_id": "CSAFPID-31039"
},
"product_reference": "CSAFPID-21105",
"relates_to_product_reference": "CSAFPID-11037"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware RAD all versions installed on RAD-80211-XD",
"product_id": "CSAFPID-31040"
},
"product_reference": "CSAFPID-21105",
"relates_to_product_reference": "CSAFPID-11038"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware RAD all versions installed on RAD-80211-XDB",
"product_id": "CSAFPID-31041"
},
"product_reference": "CSAFPID-21105",
"relates_to_product_reference": "CSAFPID-11039"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware RAD all versions installed on RAD-WHG/WLAN-XD",
"product_id": "CSAFPID-31042"
},
"product_reference": "CSAFPID-21105",
"relates_to_product_reference": "CSAFPID-11040"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware TPC 6013 all versions installed on TPC 6013",
"product_id": "CSAFPID-31043"
},
"product_reference": "CSAFPID-21106",
"relates_to_product_reference": "CSAFPID-11041"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware TPC 6013 all versions installed on TPC 6013",
"product_id": "CSAFPID-31044"
},
"product_reference": "CSAFPID-21106",
"relates_to_product_reference": "CSAFPID-11042"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware TPC 6013 all versions installed on TPC 6013 P",
"product_id": "CSAFPID-31045"
},
"product_reference": "CSAFPID-21106",
"relates_to_product_reference": "CSAFPID-11043"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware TPC 6013 all versions installed on TPC 6013",
"product_id": "CSAFPID-31046"
},
"product_reference": "CSAFPID-21106",
"relates_to_product_reference": "CSAFPID-11044"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 30xx all versions installed on VMT 3008",
"product_id": "CSAFPID-31047"
},
"product_reference": "CSAFPID-21107",
"relates_to_product_reference": "CSAFPID-11045"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 30xx all versions installed on VMT 30xx",
"product_id": "CSAFPID-31048"
},
"product_reference": "CSAFPID-21107",
"relates_to_product_reference": "CSAFPID-11046"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 30xx all versions installed on VMT 3010 EXP SUN",
"product_id": "CSAFPID-31049"
},
"product_reference": "CSAFPID-21107",
"relates_to_product_reference": "CSAFPID-11047"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 30xx all versions installed on VMT 3012",
"product_id": "CSAFPID-31050"
},
"product_reference": "CSAFPID-21107",
"relates_to_product_reference": "CSAFPID-11048"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 30xx all versions installed on VMT 3012 EXP SUN",
"product_id": "CSAFPID-31051"
},
"product_reference": "CSAFPID-21107",
"relates_to_product_reference": "CSAFPID-11049"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 50xx all versions installed on VMT 5010",
"product_id": "CSAFPID-31052"
},
"product_reference": "CSAFPID-21108",
"relates_to_product_reference": "CSAFPID-11050"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 50xx all versions installed on VMT 5012",
"product_id": "CSAFPID-31053"
},
"product_reference": "CSAFPID-21108",
"relates_to_product_reference": "CSAFPID-11051"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 50xx all versions installed on VMT 5015 DAF 01",
"product_id": "CSAFPID-31054"
},
"product_reference": "CSAFPID-21108",
"relates_to_product_reference": "CSAFPID-11052"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 70xx all versions installed on VMT 7010",
"product_id": "CSAFPID-31055"
},
"product_reference": "CSAFPID-21109",
"relates_to_product_reference": "CSAFPID-11053"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 70xx all versions installed on VMT 7008",
"product_id": "CSAFPID-31056"
},
"product_reference": "CSAFPID-21109",
"relates_to_product_reference": "CSAFPID-11056"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN 2.21 installed on FL WLAN 1100",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN 2.21 installed on FL WLAN 1101",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN 2.21 installed on FL WLAN 2100",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN 2.21 installed on FL WLAN 2101",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN 3.06 installed on FL WLAN 5100",
"product_id": "CSAFPID-32005"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN 3.06 installed on FL WLAN 5101",
"product_id": "CSAFPID-32006"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN 3.06 installed on FL WLAN 5102",
"product_id": "CSAFPID-32007"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN 3.06 installed on FL WLAN 5110",
"product_id": "CSAFPID-32008"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11059"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL WLAN 3.06 installed on FL WLAN 5111",
"product_id": "CSAFPID-32009"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11060"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL EPA 2 1.53 installed on FL EPA 2",
"product_id": "CSAFPID-32010"
},
"product_reference": "CSAFPID-22003",
"relates_to_product_reference": "CSAFPID-11057"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FL EPA 2 1.53 installed on FL EPA 2 RSMA",
"product_id": "CSAFPID-32011"
},
"product_reference": "CSAFPID-22003",
"relates_to_product_reference": "CSAFPID-11058"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 70xx all versions installed on VMT 7012",
"product_id": "CSAFPID-31058"
},
"product_reference": "CSAFPID-21109",
"relates_to_product_reference": "CSAFPID-11054"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware VMT 70xx all versions installed on VMT 7015",
"product_id": "CSAFPID-31059"
},
"product_reference": "CSAFPID-21109",
"relates_to_product_reference": "CSAFPID-11055"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13077",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31058",
"CSAFPID-31059"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "PHOENIX CONTACT is actively working on these vulnerabilities. CERT@VDE will update this advisory as soon as further significant details are provided by the vendor, especially with information about patches provided.\n\nFor PHOENIX CONTACT devices running Microsoft Windows, we recommend to apply the security update provided by Microsoft external link. If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\n\nThis advisory will be updated as further details become available.\n\nFor the following products a firmware update addressing the issues is available for download on the Download tab of the corresponding product page on our website:\n\nProducts: FL EPA 2, FL EPA 2 RSMA\t\nFixed Firmware: 1.53 or higher\t\nReleased: 06/2018\n\nProducts: FL WLAN 5100, FL WLAN 5101, FL WLAN 5102, FL WLAN 5110, FL WLAN 5111\nFixed Firmware: FW 3.06 or higher\nReleased: 06/2018\n\nProducts: FL WLAN 1100, FL WLAN 1101, FL WLAN 2100, FL WLAN 2101\nFixed Firmware: FW 2.21 or higher\nReleased: 06/2018",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 6.8,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.8,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31058",
"CSAFPID-31059"
]
}
],
"title": "CVE-2017-13077"
},
{
"cve": "CVE-2017-13078",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31058",
"CSAFPID-31059"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "PHOENIX CONTACT is actively working on these vulnerabilities. CERT@VDE will update this advisory as soon as further significant details are provided by the vendor, especially with information about patches provided.\n\nFor PHOENIX CONTACT devices running Microsoft Windows, we recommend to apply the security update provided by Microsoft external link. If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\n\nThis advisory will be updated as further details become available.\n\nFor the following products a firmware update addressing the issues is available for download on the Download tab of the corresponding product page on our website:\n\nProducts: FL EPA 2, FL EPA 2 RSMA\t\nFixed Firmware: 1.53 or higher\t\nReleased: 06/2018\n\nProducts: FL WLAN 5100, FL WLAN 5101, FL WLAN 5102, FL WLAN 5110, FL WLAN 5111\nFixed Firmware: FW 3.06 or higher\nReleased: 06/2018\n\nProducts: FL WLAN 1100, FL WLAN 1101, FL WLAN 2100, FL WLAN 2101\nFixed Firmware: FW 2.21 or higher\nReleased: 06/2018",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31058",
"CSAFPID-31059"
]
}
],
"title": "CVE-2017-13078"
},
{
"cve": "CVE-2017-13080",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31058",
"CSAFPID-31059"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "PHOENIX CONTACT is actively working on these vulnerabilities. CERT@VDE will update this advisory as soon as further significant details are provided by the vendor, especially with information about patches provided.\n\nFor PHOENIX CONTACT devices running Microsoft Windows, we recommend to apply the security update provided by Microsoft external link. If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\n\nThis advisory will be updated as further details become available.\n\nFor the following products a firmware update addressing the issues is available for download on the Download tab of the corresponding product page on our website:\n\nProducts: FL EPA 2, FL EPA 2 RSMA\t\nFixed Firmware: 1.53 or higher\t\nReleased: 06/2018\n\nProducts: FL WLAN 5100, FL WLAN 5101, FL WLAN 5102, FL WLAN 5110, FL WLAN 5111\nFixed Firmware: FW 3.06 or higher\nReleased: 06/2018\n\nProducts: FL WLAN 1100, FL WLAN 1101, FL WLAN 2100, FL WLAN 2101\nFixed Firmware: FW 2.21 or higher\nReleased: 06/2018",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31058",
"CSAFPID-31059"
]
}
],
"title": "CVE-2017-13080"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…