Rockwell Automation Stratix 5100 (Update A)
Vulnerability in Rockwell Automation Stratix 5100 wireless access point and workgroup bridge devices with firmware < 15.3(3) JC1 allows an attacker with wireless network access to perform man-in-the-middle attacks on client connections when 802.11r fast roaming is enabled. This could allow the attacker to intercept or modify wireless communications between clients and the access point.\n\nRockwell notes that 802.11r is not fully supported on the Stratix 5100, so access-point users operating without 802.11r enabled are not affected and do not require patching. However, wireless client devices that connect to the Stratix 5100 should be patched by their respective manufacturers. A firmware patch for the Stratix 5100 itself will be released in version 15.3(3) JC1 or later when available.
- Wireless access to the Stratix 5100 network or adjacent network access
- Stratix 5100 must have firmware version < 15.3(3) JC1
- 802.11r must be enabled on the device (though 802.11r is not fully supported on this model)
- Vulnerable wireless client devices must be connected to the Stratix 5100
Patching may require device reboot — plan for process interruption
/api/v1/advisories/784eebe8-a6c4-4d04-9aa4-2747363d1936