Share: Email | Twitter

ID

VDE-2019-004

Published

2019-03-14 08:52 (CET)

Last update

2020-02-19 08:57 (CET)

Vendor(s)

PEPPERL+FUCHS

Product(s)

i.roc Ci70-Ex
Cx70-Ex
CT50-Ex
Pad-Ex 01
Tab-Ex 01
Smart-Ex 01
Smart-Ex 201
Ex-Handy 09
Ex-Handy 209

Summary

A collection of Bluetooth attack vectors were discovered and related vulnerabilities known as "BlueBorne" were disclosed. These vulnerabilities collectively endanger amongst others Windows, Linux and mobile operating systems like Android or IOS. An unauthenticated attacker may take control of devices and perform commands or access sensitive data.

Vulnerabilities



Weakness
Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)
Summary
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.
Weakness
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE-120)
Summary
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146237.
Weakness
Insufficient Information (NVD-CWE-noinfo)
Summary
Microsoft Bluetooth Driver in Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703 allows a spoofing vulnerability due to Microsoft's implementation ...
Weakness
Information Exposure (CWE-200)
Summary
A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146698.
Weakness
Information Exposure (CWE-200)
Summary
A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63145701.

Impact

An unauthenticated, remote attacker may be able to obtain private information about the device or user, execute arbitrary code on the device or perform a virtually invisible Man-in-the-middle (MitM) attack.

Solution

Customers using affected Pepperl+Fuchs / ecom instruments products are recommended to update the device. For released firmware updates see table below.

Product  Date  Updatesource
 CT50-Ex Android  09/2017  FOTA-Update
 CT50-Ex Windows  10/2017  Microsoft Update
 Pad-Ex 01  09/2017  Microsoft Update
 Smart-Ex 01  09/2018  FOTA-Update
 Smart-Ex 201  10/2018  FOTA-Update


In case there is no update available, users should consider the following workaround:

Deactivation of Bluetooth on the device

Unused or not needed Bluetooth should be switched off / disabled on affected devices.

Reported by

These vulnerabilities were publicly disclosed by Ben Seri and Gregory Vishnepolsky of Armis.

https://www.armis.com/blueborne