CVE-2023-0354

9.1 CRITICAL

📋 TL;DR

The Akuvox E11 web server lacks authentication controls, allowing unauthenticated attackers to access sensitive information and create/download packet captures via default URLs. This affects organizations using Akuvox E11 devices, particularly in industrial control systems and physical security deployments.

💻 Affected Systems

Products:
  • Akuvox E11
Versions: All versions prior to patched version
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations where web interface is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of device, unauthorized access to sensitive network traffic via packet captures, potential lateral movement into connected systems, and disruption of physical security operations.

🟠

Likely Case

Unauthorized access to device configuration, sensitive information disclosure, and network reconnaissance through packet capture analysis.

🟢

If Mitigated

Limited impact if device is isolated in protected network segments with strict access controls and monitoring.

🌐 Internet-Facing: HIGH - Direct internet exposure allows immediate exploitation without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web access to device with known default URLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for specific patched version

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01

Restart Required: Yes

Instructions:

1. Contact Akuvox for firmware updates. 2. Download latest firmware. 3. Apply update via web interface. 4. Reboot device. 5. Verify authentication is required.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Akuvox E11 devices in protected network segments with strict firewall rules.

Access Control Lists

all

Implement strict IP-based access controls to limit web interface access.

🧯 If You Can't Patch

  • Disable web interface if not required for operations
  • Implement network monitoring for unauthorized access attempts to device URLs

🔍 How to Verify

Check if Vulnerable:

Attempt to access device web interface without authentication using browser or curl command.

Check Version:

Check firmware version in device web interface or contact vendor.

Verify Fix Applied:

Verify authentication prompt appears when accessing web interface and default URLs require credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to web interface
  • Access to packet capture URLs without authentication

Network Indicators:

  • HTTP requests to device IP on port 80/443 without authentication headers
  • Unusual packet capture file downloads

SIEM Query:

source_ip="device_ip" AND (http_status=200 OR url_contains="pcap") AND NOT auth_present

🔗 References

📤 Share & Export