CVE-2022-28223

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated admin users on Tekon KIO devices to escalate privileges to root by uploading malicious Lua plugin scripts. It affects Tekon KIO devices through March 30, 2022. The vulnerability enables remote code execution with root privileges.

💻 Affected Systems

Products:
  • Tekon KIO devices
Versions: Through 2022-03-30
Operating Systems: Embedded Linux-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication, but default configurations likely include admin access. These are SCADA/industrial controllers often deployed in critical infrastructure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin credentials gains full root access to the device, potentially compromising the entire SCADA/industrial control system, manipulating industrial processes, or establishing persistence in critical infrastructure.

🟠

Likely Case

Malicious insiders or compromised admin accounts upload Lua scripts to gain root privileges, execute arbitrary commands, and potentially pivot to other systems in the industrial network.

🟢

If Mitigated

With proper access controls, network segmentation, and monitoring, impact is limited to the specific device, though root compromise still allows significant local damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once authenticated. Public technical details and proof-of-concept are available in the referenced Medium articles.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

Contact Tekon for security updates or patches. Check vendor website for firmware updates released after March 30, 2022.

🔧 Temporary Workarounds

Restrict Lua Plugin Uploads

all

Disable or restrict the ability to upload Lua plugins through admin interface if not required for operations.

Network Segmentation

all

Isolate Tekon KIO devices in separate network segments with strict firewall rules limiting access to admin interfaces.

🧯 If You Can't Patch

  • Implement strict access controls for admin accounts with multi-factor authentication and regular credential rotation.
  • Deploy network monitoring and intrusion detection systems to detect unusual Lua file uploads or privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version date. If it's March 30, 2022 or earlier, the device is likely vulnerable. Review admin interface for Lua plugin upload functionality.

Check Version:

Check through device web interface or console: Typically in System > About or similar menu. No universal CLI command available.

Verify Fix Applied:

Verify firmware version is newer than March 30, 2022. Test if Lua plugin upload functionality has been removed or properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Lua file uploads via admin interface
  • Privilege escalation attempts
  • Root user activity from admin accounts

Network Indicators:

  • HTTP POST requests to plugin upload endpoints
  • Unusual outbound connections from KIO devices

SIEM Query:

source="kio_device" AND (event="plugin_upload" OR event="privilege_escalation")

🔗 References

📤 Share & Export