CVE-2023-0347
📋 TL;DR
This vulnerability allows attackers to identify Akuvox E11 devices on the Akuvox cloud by combining MAC and IP addresses. This affects organizations using Akuvox E11 devices connected to the Akuvox cloud service. The exposure could facilitate targeted attacks against specific devices.
💻 Affected Systems
- Akuvox E11
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could identify and target specific devices for further exploitation, potentially leading to unauthorized access, data exfiltration, or device compromise.
Likely Case
Attackers could map organizational device deployments, enabling reconnaissance for future attacks or facilitating targeted phishing/social engineering.
If Mitigated
With proper network segmentation and monitoring, the impact is limited to information disclosure about device presence.
🎯 Exploit Status
Exploitation requires network access to observe MAC/IP combinations and access to Akuvox cloud services
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor for latest firmware
Vendor Advisory: https://www.akuvox.com/support
Restart Required: Yes
Instructions:
1. Contact Akuvox support for latest firmware. 2. Download firmware update. 3. Apply update via device management interface. 4. Reboot device.
🔧 Temporary Workarounds
Disable Cloud Connectivity
allPrevent device from connecting to Akuvox cloud services
Configure device to use local management only
Network Segmentation
allIsolate Akuvox devices in separate network segment
Implement VLAN segmentation
Configure firewall rules to restrict cloud access
🧯 If You Can't Patch
- Segment Akuvox devices in isolated network with restricted internet access
- Monitor network traffic for unusual cloud connections or reconnaissance attempts
🔍 How to Verify
Check if Vulnerable:
Check if device MAC and IP addresses are exposed in cloud communications
Check Version:
Check device web interface or management console for firmware version
Verify Fix Applied:
Verify device firmware version is updated and cloud communications no longer expose identifying information
📡 Detection & Monitoring
Log Indicators:
- Unusual cloud connection patterns
- Multiple device identification attempts
Network Indicators:
- Traffic to Akuvox cloud services containing device identifiers
- Reconnaissance patterns targeting specific MAC/IP combinations
SIEM Query:
source_ip IN (akuvox_devices) AND dest_ip IN (akuvox_cloud_ips) AND (protocol="http" OR protocol="https")