CVE-2021-32089

9.8 CRITICAL

📋 TL;DR

CVE-2021-32089 allows unauthenticated attackers to upload arbitrary files to Zebra FX9500 RFID Reader filesystems, which can then be accessed via the web interface. This can lead to information disclosure and remote code execution. Only affects FX9500 devices that are no longer supported by the vendor.

💻 Affected Systems

Products:
  • Zebra (formerly Motorola Solutions) Fixed RFID Reader FX9500
Versions: All versions (product is end-of-life)
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices that are no longer supported by Zebra. These are end-of-life products with no official patches available.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, allowing attacker to control the RFID reader, steal sensitive RFID data, and pivot to other network systems.

🟠

Likely Case

Information disclosure of sensitive configuration files and potential malware deployment on vulnerable devices.

🟢

If Mitigated

Limited impact if devices are isolated from untrusted networks and have strict access controls.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing devices extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, unauthenticated access allows any network user to exploit the vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has publicly available exploit details, making exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.zebra.com/us/en/support-downloads/rfid/rfid-readers/fx9500.html

Restart Required: No

Instructions:

No official patch available. Zebra has ended support for FX9500 devices. Consider upgrading to supported hardware.

🔧 Temporary Workarounds

Network Isolation

linux

Isolate FX9500 devices from untrusted networks and restrict access to authorized IPs only.

Use firewall rules to restrict access: iptables -A INPUT -s [TRUSTED_IP] -p tcp --dport [WEB_PORT] -j ACCEPT
iptables -A INPUT -p tcp --dport [WEB_PORT] -j DROP

Disable Web Interface

all

Disable the web interface if not required for operations.

Disable via device configuration if available
Block web port at firewall level

🧯 If You Can't Patch

  • Replace with supported hardware (Zebra recommends upgrading to newer RFID readers)
  • Implement strict network segmentation and zero-trust principles around these devices

🔍 How to Verify

Check if Vulnerable:

Check device model and support status. If it's an FX9500 RFID Reader, it is vulnerable as no patches exist.

Check Version:

Check device web interface or serial console for model information

Verify Fix Applied:

No fix available to verify. Only mitigation through network controls or hardware replacement.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads via web interface
  • Unauthenticated access attempts to upload endpoints
  • Unexpected file creation in web-accessible directories

Network Indicators:

  • HTTP POST requests to file upload endpoints from unauthorized sources
  • Unusual outbound connections from RFID readers

SIEM Query:

source="fx9500" AND (http_method="POST" AND uri CONTAINS "upload") AND user="-"

🔗 References

📤 Share & Export