CVE-2023-0351
📋 TL;DR
This vulnerability allows remote command injection in Akuvox E11 devices through the phone-book contacts functionality. Attackers can upload files containing executable commands, potentially gaining full control of affected devices. Organizations using Akuvox E11 devices are affected.
💻 Affected Systems
- Akuvox E11
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attacker to execute arbitrary commands, install malware, pivot to internal networks, or disrupt operations.
Likely Case
Unauthorized access to device, data exfiltration, or use as foothold for further attacks within the network.
If Mitigated
Limited impact if devices are isolated, have restricted network access, and proper monitoring is in place.
🎯 Exploit Status
Command injection vulnerabilities are typically easy to exploit once details are known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched versions
Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
Restart Required: Yes
Instructions:
1. Check current device version. 2. Contact Akuvox for firmware updates. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Verify update applied successfully.
🔧 Temporary Workarounds
Network Isolation
allIsolate Akuvox E11 devices from untrusted networks and internet
Access Control
allRestrict network access to devices using firewall rules
🧯 If You Can't Patch
- Segment network to isolate vulnerable devices
- Implement strict firewall rules to limit device access
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against vendor advisory. Devices running unpatched versions are vulnerable.
Check Version:
Check device web interface or console for firmware version information
Verify Fix Applied:
Verify firmware version matches patched version from vendor advisory and test phone-book functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to phone-book contacts
- Unexpected command execution in system logs
- Unauthorized access attempts
Network Indicators:
- Suspicious traffic to device web interface
- Unexpected outbound connections from device
SIEM Query:
source="akuvox-e11" AND (event="file_upload" OR event="command_execution")