CVE-2023-4203
📋 TL;DR
This stored cross-site scripting (XSS) vulnerability in Advantech EKI-1524, EKI-1522, and EKI-1521 devices allows authenticated attackers to inject malicious scripts into the ping tool of the web interface. When other users access the affected page, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. Only authenticated users can exploit this vulnerability.
💻 Affected Systems
- Advantech EKI-1524
- Advantech EKI-1522
- Advantech EKI-1521
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated malicious user could steal administrator credentials, hijack sessions, redirect users to malicious sites, or perform administrative actions on behalf of other users, potentially leading to full device compromise.
Likely Case
Authenticated attackers with lower privileges could escalate privileges by stealing administrator cookies/sessions, leading to unauthorized configuration changes or device takeover.
If Mitigated
With proper input validation and output encoding, the malicious scripts would be rendered harmless as text rather than executable code.
🎯 Exploit Status
Exploit details and proof-of-concept are publicly available. Attack requires authenticated access to the web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
Check Advantech website for firmware updates. If available, download latest firmware and follow vendor upgrade procedures.
🔧 Temporary Workarounds
Restrict Web Interface Access
allLimit access to the device web interface to trusted networks only using firewall rules.
Disable Ping Tool
allIf ping functionality is not required, disable or restrict access to the ping tool in the web interface.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected devices from critical networks
- Enforce strong authentication policies and monitor for suspicious authenticated user activity
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface. If version is 1.21 or earlier, device is vulnerable.
Check Version:
Login to web interface and check System Information or About page for firmware version
Verify Fix Applied:
Verify firmware version is later than 1.21. Test ping tool with XSS payloads to confirm they are properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual ping tool usage patterns
- Multiple failed authentication attempts followed by successful login
- Web interface access from unexpected IP addresses
Network Indicators:
- HTTP requests containing script tags or JavaScript in ping tool parameters
- Unusual outbound connections from device after web interface access
SIEM Query:
source="advantech_web_logs" AND (uri="/ping" OR uri="/cgi-bin/ping") AND (query CONTAINS "<script>" OR query CONTAINS "javascript:")
🔗 References
- http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html
- http://seclists.org/fulldisclosure/2023/Aug/13
- https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/
- http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html
- http://seclists.org/fulldisclosure/2023/Aug/13
- https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/