PEPPERL+FUCHS / ecom instruments WLAN enabled products utilizing WPA2 encryption (Update A)

VDE-2017-005 (2017-12-11 14:26 UTC+0200)

Affected Vendors

PEPPERL+FUCHS, ecom instruments

Affected Products

Tab-Ex 01, Ex-Handy 09, Ex-Handy 209, Smart-Ex 01, Smart-Ex 201, Pad-Ex 01, i.roc Ci70-Ex, CK70A-ATEX, CK71A-ATEX, CN70A-ATEX, CN70E-ATEX

Vulnerability Type

Gain Information


Multiple security issues and vulnerabilities within the WPA2 standard have been identified and publicized by Mr. Mathy Vanhoef of KU Leuven. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point (AP). In consequence, an attacker could establish a man-in-the-middle position between AP and client facilitating packet decryption and injection.

ecom instruments is a subsidiary company of PEPPERL+FUCHS.


ecom instruments devices are in theory attackable by replay, decryption and forging of packets. However, to perform the attack, the attacker must be significantly closer to the ecom device than to the access point. The WPA2 password cannot be compromised using a KRACK attack. Note if WPA-TKIP is used instead of AES-CCMP, an attacker can easily forge and inject packets directly into the WLAN.


23.10.2018, Update A: Firmware for Android based devices now available 


Affected Products: Tab-Ex 01, Ex-Handy 09, Ex-Handy 209, Smart-Ex 01, Smart-Ex 201

Pepperl+Fuchs has released firmware updates for the following products




Smart-Ex 01

Available since 09/2018


Smart-Ex 201

Available since 10/2018




Affected Products: Pad-Ex 01, i.roc Ci70-Ex, CK70A-ATEX, CK71A-ATEX, CN70A-ATEX, CN70E-ATEX

For ecom instruments devices running Windows, we recommend to apply the security update provided by Microsoft. If you are using WPA-TKIP in your WLAN, you should switch to AES-CCMP immediately.


This advisory will be updated as further details and/or software updates become available.

Reported by

Mathy Vanhoef of imec-DistriNet, KU Leuven published this vulnerability on

PEPPERL+FUCHS reported this vulnerability to CERT@VDE.