CVE-2023-0351

8.8 HIGH

📋 TL;DR

This vulnerability allows remote command injection in Akuvox E11 devices through the phone-book contacts functionality. Attackers can upload files containing executable commands, potentially gaining full control of affected devices. Organizations using Akuvox E11 devices are affected.

💻 Affected Systems

Products:
  • Akuvox E11
Versions: All versions prior to patch
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web server backend library in phone-book contacts functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to execute arbitrary commands, install malware, pivot to internal networks, or disrupt operations.

🟠

Likely Case

Unauthorized access to device, data exfiltration, or use as foothold for further attacks within the network.

🟢

If Mitigated

Limited impact if devices are isolated, have restricted network access, and proper monitoring is in place.

🌐 Internet-Facing: HIGH - Devices exposed to internet are directly vulnerable to remote exploitation.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities are typically easy to exploit once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01

Restart Required: Yes

Instructions:

1. Check current device version. 2. Contact Akuvox for firmware updates. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Verify update applied successfully.

🔧 Temporary Workarounds

Network Isolation

all

Isolate Akuvox E11 devices from untrusted networks and internet

Access Control

all

Restrict network access to devices using firewall rules

🧯 If You Can't Patch

  • Segment network to isolate vulnerable devices
  • Implement strict firewall rules to limit device access

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor advisory. Devices running unpatched versions are vulnerable.

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

Verify firmware version matches patched version from vendor advisory and test phone-book functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to phone-book contacts
  • Unexpected command execution in system logs
  • Unauthorized access attempts

Network Indicators:

  • Suspicious traffic to device web interface
  • Unexpected outbound connections from device

SIEM Query:

source="akuvox-e11" AND (event="file_upload" OR event="command_execution")

🔗 References

📤 Share & Export