CVE-2023-1967

9.8 CRITICAL

📋 TL;DR

Keysight N8844A Data Analytics Web Service contains a deserialization vulnerability that allows remote attackers to execute arbitrary code by sending specially crafted data. This affects organizations using Keysight's data analytics software in industrial control systems. The vulnerability requires no authentication and has a critical CVSS score of 9.8.

💻 Affected Systems

Products:
  • Keysight N8844A Data Analytics Web Service
Versions: All versions prior to the patch
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web service component specifically; requires the service to be running and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, disrupt industrial processes, steal sensitive data, and pivot to other network systems.

🟠

Likely Case

Remote code execution leading to data theft, system manipulation, and potential ransomware deployment in industrial environments.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH - The web service is typically internet-facing in industrial environments, and exploitation requires no authentication.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by any network-accessible attacker or malware.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Deserialization vulnerabilities are commonly exploited with publicly available tools and techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Keysight advisory for specific version

Vendor Advisory: https://www.keysight.com/us/en/support/software-security.html

Restart Required: Yes

Instructions:

1. Check Keysight security advisory for patch details. 2. Download and apply the patch from Keysight support portal. 3. Restart the N8844A service. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the N8844A service from untrusted networks and internet access

Access Control Lists

all

Implement strict firewall rules to limit access to the web service

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Deploy intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if N8844A Data Analytics Web Service is running and accessible on your network

Check Version:

Check service version through N8844A web interface or configuration files

Verify Fix Applied:

Verify patch version matches Keysight's security advisory and test service functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual deserialization errors in application logs
  • Unexpected process creation from web service

Network Indicators:

  • Malformed HTTP requests to N8844A web service endpoints
  • Unusual outbound connections from the service

SIEM Query:

source="N8844A" AND (event_type="deserialization_error" OR process="cmd.exe" OR process="powershell.exe")

🔗 References

📤 Share & Export