VDE-2019-005
Vulnerability from csaf_endresshauserag - Published: 2019-03-19 15:34 - Updated: 2019-03-19 15:34Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
| URL | Category | |
|---|---|---|
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"KU Leuven"
],
"organization": "krack attacks",
"summary": "reporting",
"urls": [
"https://www.krackattacks.com/"
]
},
{
"names": [
"Mathy Vanhoef"
],
"organization": "imec-DistriNet ",
"summary": "reporting"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Multiple security issues and vulnerabilities within the WPA2 standard have been identified and publicized by Mr. Mathy Vanhoef of KU Leuven. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point (AP). In consequence, an attacker could establish a man-in-the-middle position between AP and client facilitating packet decryption and injection.\nThe Field Xpert SFX370 and SFX350 handhelds are manufactured by Pepperl+Fuchs/ecom instruments for Endress+Hauser.\nThe Advisory for Pepperl+Fuchs/ecom instruments can be found here: VDE-2017-005",
"title": "Summary"
},
{
"category": "description",
"text": "The devices are in theory attackable by replay, decryption and faking of packets. However, to perform the attack, the attacker must be significantly closer to the ecom device than to the access point. The WPA2 password cannot be compromised using a KRACK attack. Note if WPA-TKIP is used instead of AES-CCMP, an attacker can easily fake and inject packets directly into the WIFI.",
"title": "Impact"
},
{
"category": "description",
"text": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@endress.com",
"name": "Endress+Hauser AG",
"namespace": "https://www.endress.com"
},
"references": [
{
"category": "self",
"summary": "VDE-2019-005: Endress+Hauser: WIFI enabled products utilising WPA2 - HTML",
"url": "https://certvde.com/en/advisories/VDE-2019-005/"
},
{
"category": "self",
"summary": "VDE-2019-005: Endress+Hauser: WIFI enabled products utilising WPA2 - CSAF",
"url": "https://endress-hauser.csaf-tp.certvde.com/.well-known/csaf/white/2019/vde-2019-005.json"
},
{
"category": "external",
"summary": "Vendor PSIRT",
"url": "https://www.endress.com"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Endress+Hauser AG",
"url": "https://certvde.com/en/advisories/vendor/endress-hauser/"
}
],
"title": "Endress+Hauser: WIFI enabled products utilising WPA2",
"tracking": {
"aliases": [
"VDE-2019-005"
],
"current_release_date": "2019-03-19T15:34:00.000Z",
"generator": {
"date": "2025-05-26T13:13:31.733Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.26"
}
},
"id": "VDE-2019-005",
"initial_release_date": "2019-03-19T15:34:00.000Z",
"revision_history": [
{
"date": "2019-03-19T15:34:00.000Z",
"number": "1",
"summary": "Initial revision."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Field Xpert SFX350 vers:all/*",
"product_id": "CSAFPID-11001"
}
}
],
"category": "product_name",
"name": "Field Xpert SFX350"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Field Xpert SFX370 vers:all/*",
"product_id": "CSAFPID-11002"
}
}
],
"category": "product_name",
"name": "Field Xpert SFX370"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Field Xpert SMT70 vers:all/*",
"product_id": "CSAFPID-11003"
}
}
],
"category": "product_name",
"name": "Field Xpert SMT70"
}
],
"category": "product_family",
"name": "Hardware"
}
],
"category": "vendor",
"name": "Vendor"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
],
"summary": "Affected products."
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13077",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 6.8,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.8,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
}
],
"title": "CVE-2017-13077"
},
{
"cve": "CVE-2017-13078",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
}
],
"title": "CVE-2017-13078"
},
{
"cve": "CVE-2017-13080",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-13079",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
}
],
"title": "CVE-2017-13079"
},
{
"cve": "CVE-2017-13081",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
}
],
"title": "CVE-2017-13081"
},
{
"cve": "CVE-2017-13082",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
}
],
"title": "CVE-2017-13082"
},
{
"cve": "CVE-2017-13086",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 6.8,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.8,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
}
],
"title": "CVE-2017-13086"
},
{
"cve": "CVE-2017-13087",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
}
],
"title": "CVE-2017-13087"
},
{
"cve": "CVE-2017-13088",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For Field Xpert handheld devices (SFX350/SFX370) running Windows Mobile, Endress+Hauser recommends to apply the security updates provided by Microsoft.\n\nIntermec/Honeywell as producer of the basis of the handheld provide the following security patch for the Windows Mobile operating system: SR18012500_802T_Cx70_WM65_ALL.CAB\n\nTo obtain this patch, please contact your local Endress+Hauser representative.\nIf you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.\nFor Field Xpert tablet PC for device configuration (SMT70) running Windows 10 Pro 1703 64 EN, Endress+Hauser strongly recommends updating to the newest available Windows version.\nAs a general security measure Endress+Hauser strongly recommends to protect network access to the WIFI network with appropriate mechanisms. It is advised to configure the environment in order to run the devices in a protected IT environment.\n\nNote: This advisory will be updated as further details and/or software updates become available.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-11001",
"CSAFPID-11002",
"CSAFPID-11003"
]
}
],
"title": "CVE-2017-13088"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.