PEPPERL+FUCHS/ecom instruments WLAN Capable Devices using the WPA2 Protocol
Pepperl+Fuchs WLAN-capable ATEX devices (CK71A-ATEX, Smart-Ex 201, Ex-Handy 09, CN70E-ATEX, CN70A-ATEX, CK70A-ATEX, i.roc Ci70-Ex, Tab-Ex 01, Smart-Ex 01, Pad-Ex 01, Ex-Handy 209) use the WPA2 wireless protocol, which is vulnerable to key recovery attacks that allow an attacker within WiFi range to decrypt and potentially modify wireless communications without authentication. The vulnerability affects Android-based models: Tab-Ex 01, Ex-Handy 09, Ex-Handy 209, Smart-Ex 01, Smart-Ex 201. Pepperl+Fuchs has not announced availability of firmware patches for any affected product.
- Wireless network proximity to an affected WLAN-capable device
- Device must be in operation and transmitting on the vulnerable WiFi network
- No credentials required for the initial WPA2 protocol attack
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5c0726c2-ec46-475b-aa58-9282525c729cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.