CVE-2023-35803
📋 TL;DR
A buffer overflow vulnerability in IQ Engine on Extreme Network AP devices allows remote attackers to execute arbitrary code or cause denial of service. This affects organizations using Extreme Network access points with vulnerable IQ Engine versions. Attackers can exploit this without authentication to potentially take full control of affected devices.
💻 Affected Systems
- Extreme Network AP devices with IQ Engine
📦 What is this software?
Iq Engine by Extremenetworks
Iq Engine by Extremenetworks
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, lateral movement to internal networks, and persistent backdoor installation.
Likely Case
Denial of service causing AP outages, or limited code execution for reconnaissance and credential harvesting.
If Mitigated
If network segmentation and strict access controls are in place, impact may be limited to the affected AP segment only.
🎯 Exploit Status
CVSS 9.8 indicates critical severity with network-accessible, unauthenticated exploitation possible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: IQ Engine 10.6r2 or later
Vendor Advisory: https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472
Restart Required: Yes
Instructions:
1. Download IQ Engine 10.6r2 or later from Extreme Networks support portal. 2. Upload firmware to affected APs. 3. Apply firmware update. 4. Reboot devices to complete installation.
🔧 Temporary Workarounds
Network segmentation and access control
allRestrict network access to AP management interfaces to trusted IPs only
Configure firewall rules to limit access to AP management IPs/ports
Disable unnecessary services
allDisable acsd service if not required for functionality
Check Extreme documentation for service disable commands
🧯 If You Can't Patch
- Isolate affected APs on separate VLAN with strict firewall rules
- Implement network monitoring and intrusion detection for exploit attempts
🔍 How to Verify
Check if Vulnerable:
Check IQ Engine version via AP web interface or CLI: show version
Check Version:
show version | include IQ Engine
Verify Fix Applied:
Confirm version is 10.6r2 or later after update
📡 Detection & Monitoring
Log Indicators:
- Unusual acsd service crashes
- Memory access violations in system logs
- Unexpected process spawns
Network Indicators:
- Unusual traffic to AP management ports
- Buffer overflow patterns in network captures
SIEM Query:
source="ap_logs" AND ("acsd" AND ("crash" OR "overflow" OR "segfault"))