CVE-2023-2573
📋 TL;DR
This vulnerability allows authenticated users to execute arbitrary commands on Advantech EKI-1524, EKI-1522, and EKI-1521 industrial switches by injecting malicious commands into the NTP server configuration field. Attackers can gain full system control, potentially compromising network infrastructure. Only devices running firmware version 1.21 or earlier are affected.
💻 Affected Systems
- Advantech EKI-1524
- Advantech EKI-1522
- Advantech EKI-1521
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise leading to network disruption, lateral movement to other systems, data exfiltration, or deployment of ransomware across industrial networks.
Likely Case
Unauthorized command execution allowing attackers to modify device configurations, disrupt network services, or establish persistent backdoors.
If Mitigated
Limited impact if proper network segmentation and access controls prevent authenticated attackers from reaching vulnerable interfaces.
🎯 Exploit Status
Exploitation requires authenticated access to the web interface. Public proof-of-concept demonstrates command injection via crafted POST requests to the NTP configuration endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for latest firmware
Vendor Advisory: https://www.advantech.com/en/support/details/firmware?id=1-1J9BEBL
Restart Required: Yes
Instructions:
1. Download latest firmware from Advantech support site. 2. Backup current configuration. 3. Upload firmware via web interface. 4. Apply update and restart device. 5. Restore configuration if needed.
🔧 Temporary Workarounds
Restrict Web Interface Access
allLimit access to device management interface to trusted IP addresses only using firewall rules.
Change Default Credentials
allEnsure strong, unique passwords are set for all administrative accounts.
🧯 If You Can't Patch
- Segment affected devices on isolated VLANs with strict firewall rules preventing external and unnecessary internal access.
- Implement network monitoring for unusual POST requests to NTP configuration endpoints and command execution patterns.
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface: System > System Info. If version is 1.21 or earlier, device is vulnerable.
Check Version:
No CLI command; check via web interface at System > System Info page.
Verify Fix Applied:
After patching, verify firmware version shows later than 1.21 and test NTP configuration field with safe input validation tests.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /ntp.cgi or similar NTP configuration endpoints
- Commands containing shell metacharacters in NTP server field
- Multiple failed authentication attempts followed by successful login
Network Indicators:
- Unusual outbound connections from industrial switches
- POST requests with shell commands in parameters
SIEM Query:
source="web_logs" AND (uri="/ntp.cgi" OR uri="/cgi-bin/ntp") AND (method="POST") AND (param="*;*" OR param="*|*" OR param="*`*" OR param="*$(*")
🔗 References
- http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html
- http://seclists.org/fulldisclosure/2023/May/4
- https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/
- https://www.advantech.com/en/support/details/firmware?id=1-1J9BEBL
- https://www.advantech.com/en/support/details/firmware?id=1-1J9BECT
- https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3
- http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html
- http://seclists.org/fulldisclosure/2023/May/4
- https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/
- https://www.advantech.com/en/support/details/firmware?id=1-1J9BEBL
- https://www.advantech.com/en/support/details/firmware?id=1-1J9BECT
- https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3