CVE-2023-35803

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in IQ Engine on Extreme Network AP devices allows remote attackers to execute arbitrary code or cause denial of service. This affects organizations using Extreme Network access points with vulnerable IQ Engine versions. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Extreme Network AP devices with IQ Engine
Versions: IQ Engine versions before 10.6r2
Operating Systems: Extreme Network firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the acsd service in IQ Engine. All default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, and persistent backdoor installation.

🟠

Likely Case

Denial of service causing AP outages, or limited code execution for reconnaissance and credential harvesting.

🟢

If Mitigated

If network segmentation and strict access controls are in place, impact may be limited to the affected AP segment only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with network-accessible, unauthenticated exploitation possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IQ Engine 10.6r2 or later

Vendor Advisory: https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472

Restart Required: Yes

Instructions:

1. Download IQ Engine 10.6r2 or later from Extreme Networks support portal. 2. Upload firmware to affected APs. 3. Apply firmware update. 4. Reboot devices to complete installation.

🔧 Temporary Workarounds

Network segmentation and access control

all

Restrict network access to AP management interfaces to trusted IPs only

Configure firewall rules to limit access to AP management IPs/ports

Disable unnecessary services

all

Disable acsd service if not required for functionality

Check Extreme documentation for service disable commands

🧯 If You Can't Patch

  • Isolate affected APs on separate VLAN with strict firewall rules
  • Implement network monitoring and intrusion detection for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check IQ Engine version via AP web interface or CLI: show version

Check Version:

show version | include IQ Engine

Verify Fix Applied:

Confirm version is 10.6r2 or later after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual acsd service crashes
  • Memory access violations in system logs
  • Unexpected process spawns

Network Indicators:

  • Unusual traffic to AP management ports
  • Buffer overflow patterns in network captures

SIEM Query:

source="ap_logs" AND ("acsd" AND ("crash" OR "overflow" OR "segfault"))

🔗 References

📤 Share & Export