CVE-2022-28223
📋 TL;DR
This vulnerability allows authenticated admin users on Tekon KIO devices to escalate privileges to root by uploading malicious Lua plugin scripts. It affects Tekon KIO devices through March 30, 2022. The vulnerability enables remote code execution with root privileges.
💻 Affected Systems
- Tekon KIO devices
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker with admin credentials gains full root access to the device, potentially compromising the entire SCADA/industrial control system, manipulating industrial processes, or establishing persistence in critical infrastructure.
Likely Case
Malicious insiders or compromised admin accounts upload Lua scripts to gain root privileges, execute arbitrary commands, and potentially pivot to other systems in the industrial network.
If Mitigated
With proper access controls, network segmentation, and monitoring, impact is limited to the specific device, though root compromise still allows significant local damage.
🎯 Exploit Status
Exploitation requires admin credentials but is straightforward once authenticated. Public technical details and proof-of-concept are available in the referenced Medium articles.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not publicly available
Restart Required: No
Instructions:
Contact Tekon for security updates or patches. Check vendor website for firmware updates released after March 30, 2022.
🔧 Temporary Workarounds
Restrict Lua Plugin Uploads
allDisable or restrict the ability to upload Lua plugins through admin interface if not required for operations.
Network Segmentation
allIsolate Tekon KIO devices in separate network segments with strict firewall rules limiting access to admin interfaces.
🧯 If You Can't Patch
- Implement strict access controls for admin accounts with multi-factor authentication and regular credential rotation.
- Deploy network monitoring and intrusion detection systems to detect unusual Lua file uploads or privilege escalation attempts.
🔍 How to Verify
Check if Vulnerable:
Check device firmware version date. If it's March 30, 2022 or earlier, the device is likely vulnerable. Review admin interface for Lua plugin upload functionality.
Check Version:
Check through device web interface or console: Typically in System > About or similar menu. No universal CLI command available.
Verify Fix Applied:
Verify firmware version is newer than March 30, 2022. Test if Lua plugin upload functionality has been removed or properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual Lua file uploads via admin interface
- Privilege escalation attempts
- Root user activity from admin accounts
Network Indicators:
- HTTP POST requests to plugin upload endpoints
- Unusual outbound connections from KIO devices
SIEM Query:
source="kio_device" AND (event="plugin_upload" OR event="privilege_escalation")