CVE-2023-0352

9.1 CRITICAL

📋 TL;DR

The Akuvox E11 password recovery webpage is accessible without authentication, allowing attackers to download the device key file and reset the password to default. This affects users of Akuvox E11 devices with vulnerable firmware versions, potentially compromising device security and control.

💻 Affected Systems

Products:
  • Akuvox E11
Versions: Specific versions not detailed in references; assume all versions prior to patched firmware.
Operating Systems: Embedded firmware on Akuvox E11 devices
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with default or unchanged configurations are vulnerable; ensure firmware updates are applied.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control of the device, enabling unauthorized access, data theft, or use as a foothold for further network attacks.

🟠

Likely Case

Attackers reset passwords to default, leading to unauthorized device access and potential disruption of operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated devices, reducing broader network compromise.

🌐 Internet-Facing: HIGH, as the vulnerability is unauthenticated and exploitable remotely if devices are exposed to the internet.
🏢 Internal Only: MEDIUM, as internal attackers or malware could exploit it, but network controls may limit access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves accessing a specific webpage without credentials, making it straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched firmware version.

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01

Restart Required: Yes

Instructions:

1. Visit the vendor advisory for patch details. 2. Download the latest firmware from Akuvox. 3. Apply the update via device management interface. 4. Restart the device to activate changes.

🔧 Temporary Workarounds

Restrict Network Access

all

Block external access to the device's web interface using firewalls or network segmentation.

Disable Password Recovery Page

all

If supported, disable the vulnerable password recovery webpage via device configuration.

🧯 If You Can't Patch

  • Isolate the device on a separate VLAN to limit attack surface.
  • Implement strong network monitoring to detect unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Attempt to access the password recovery webpage without authentication; if accessible, device is vulnerable.

Check Version:

Check device firmware version via web interface or CLI; refer to vendor documentation.

Verify Fix Applied:

After patching, verify the password recovery page requires authentication or is disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access logs to password recovery page
  • Failed authentication attempts followed by password resets

Network Indicators:

  • Unusual HTTP requests to device-specific URLs
  • Traffic spikes to device management ports

SIEM Query:

Example: 'source="akuvox-e11" AND url="/password_recovery" AND status=200'

🔗 References

📤 Share & Export