PHOENIX CONTACT WLAN Capable Devices using the WPA2 Protocol
Phoenix Contact WLAN-capable devices implement the WPA2 wireless security protocol, which is vulnerable to Key Reinstallation Attacks (KRACK). This flaw allows an attacker within wireless range to intercept encrypted traffic, decrypt communications, and inject malicious packets into the wireless network. Affected products include WLAN access points, industrial Ethernet gateways, and serial-to-WLAN converters across the VMT, FL WLAN, COMSERVER, TPC, BL2, ITC, and RAD product families. All versions of affected products are impacted. The vulnerability exists in the WPA2 protocol design itself, not a firmware implementation error specific to Phoenix Contact.
- Wireless range of the affected device (approximately 300 feet or less depending on environment and antenna)
- Ability to intercept WPA2 4-way handshake traffic
- No special credentials required to begin attack
Patching may require device reboot — plan for process interruption
/api/v1/advisories/940fee45-ae9a-43fe-a760-ffa79038a2c9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.