CVE-2024-33893

6.1 MEDIUM

📋 TL;DR

Cosy+ industrial remote access gateways running vulnerable firmware versions are susceptible to cross-site scripting (XSS) attacks when displaying logs due to improper input sanitization. This allows attackers to inject malicious scripts that execute in the context of legitimate users' browsers. Organizations using affected Cosy+ devices for industrial control system remote access are impacted.

💻 Affected Systems

Products:
  • Ewon Cosy+ industrial remote access gateways
Versions: Firmware 21.x below 21.2s10, Firmware 22.x below 22.1s3
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All Cosy+ devices running affected firmware versions are vulnerable when logs are displayed through the web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack sessions, redirect users to malicious sites, or perform actions on the device with the victim's privileges, potentially compromising industrial control systems.

🟠

Likely Case

Attackers inject malicious scripts to steal session cookies or credentials, enabling unauthorized access to the Cosy+ device management interface.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the management interface of the affected device only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to have access to inject malicious content into logs or trick users into viewing crafted log entries. Detailed technical analysis is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.2s10 or 22.1s3

Vendor Advisory: https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from HMS Networks/Ewon support portal. 2. Backup device configuration. 3. Upload firmware via web interface. 4. Apply update and restart device. 5. Verify firmware version after reboot.

🔧 Temporary Workarounds

Restrict access to management interface

all

Limit access to Cosy+ web interface to trusted IP addresses only using firewall rules.

Disable unnecessary log viewing

all

Restrict user permissions to prevent access to log viewing functionality if not required.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Cosy+ devices from untrusted networks
  • Deploy web application firewall (WAF) with XSS protection rules in front of Cosy+ management interface

🔍 How to Verify

Check if Vulnerable:

Access Cosy+ web interface, navigate to System > About, check firmware version against affected ranges.

Check Version:

No CLI command available. Check via web interface at System > About page.

Verify Fix Applied:

After updating, verify firmware version shows 21.2s10 or higher for 21.x branch, or 22.1s3 or higher for 22.x branch.

📡 Detection & Monitoring

Log Indicators:

  • Unusual log entries containing script tags or JavaScript code
  • Multiple failed login attempts followed by successful login from new IP

Network Indicators:

  • HTTP requests to Cosy+ interface containing script injection patterns
  • Outbound connections from Cosy+ device to unexpected external domains

SIEM Query:

source="cosy_logs" AND (message="<script" OR message="javascript:" OR message="onerror=" OR message="onload=")

🔗 References

📤 Share & Export