CVE-2023-6930

9.4 CRITICAL

📋 TL;DR

EuroTel ETL3100 devices running vulnerable firmware versions allow unauthenticated attackers to download configuration files and logs containing sensitive information. This can lead to authentication bypass, privilege escalation, and full system compromise. Organizations using affected EuroTel ETL3100 versions are at risk.

💻 Affected Systems

Products:
  • EuroTel ETL3100
Versions: v01c01 and v01x37
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to take complete control of the device, potentially pivoting to other network systems, disrupting operations, or exfiltrating sensitive data.

🟠

Likely Case

Unauthenticated attackers download configuration files containing credentials and system information, enabling authentication bypass and privilege escalation on the device.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the isolated device, though sensitive information may still be exposed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated HTTP requests to specific endpoints can download configuration and log files. No authentication or special tools required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05

Restart Required: No

Instructions:

1. Contact EuroTel for firmware updates or mitigation guidance. 2. Monitor CISA advisory for patch availability. 3. Apply patches immediately when released.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate EuroTel ETL3100 devices from untrusted networks and internet access

Access Control Lists

all

Implement strict firewall rules to limit access to device management interfaces

🧯 If You Can't Patch

  • Remove devices from internet-facing networks immediately
  • Implement network monitoring for unauthorized access attempts to device management interfaces

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or console. If version is v01c01 or v01x37, device is vulnerable.

Check Version:

Check via device web interface or console commands specific to EuroTel ETL3100

Verify Fix Applied:

Verify firmware version has been updated to a version not listed as vulnerable. Test that configuration/log download endpoints require authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated HTTP requests to configuration/log endpoints
  • Multiple failed authentication attempts followed by successful configuration access

Network Indicators:

  • HTTP GET requests to device IP on management ports without authentication
  • Unusual data transfers from device to external IPs

SIEM Query:

source_ip=* AND dest_ip=[device_ip] AND (uri_path CONTAINS "config" OR uri_path CONTAINS "log") AND http_method=GET AND auth_status="none"

🔗 References

📤 Share & Export