CVE-2024-50359

7.2 HIGH

📋 TL;DR

This OS command injection vulnerability in Advantech EKI series industrial switches allows attackers to execute arbitrary commands on affected devices by sending specially crafted requests to the 'scan_ap' API. Attackers could gain full control of the device, potentially compromising industrial networks. Organizations using affected Advantech EKI-6333AC series switches are at risk.

💻 Affected Systems

Products:
  • Advantech EKI-6333AC-2G
  • Advantech EKI-6333AC-2GD
  • Advantech EKI-6333AC-1GPO
Versions: EKI-6333AC-2G <= 1.6.3, EKI-6333AC-2GD <= 1.6.3, EKI-6333AC-1GPO <= 1.2.1
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when web management interface is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to lateral movement within industrial networks, disruption of industrial processes, data exfiltration, or deployment of ransomware.

🟠

Likely Case

Unauthorized command execution allowing network reconnaissance, credential harvesting, or installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts from reaching vulnerable devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in an API endpoint that may be accessible without authentication depending on device configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Advantech security advisory for specific fixed versions

Vendor Advisory: https://www.advantech.com/support

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from Advantech support portal. 3. Upload firmware via web interface. 4. Reboot device after update.

🔧 Temporary Workarounds

Disable web management interface

all

Disable HTTP/HTTPS management interface if not required

Configure via CLI: no ip http server
Configure via CLI: no ip http secure-server

Restrict network access

linux

Implement firewall rules to restrict access to management interfaces

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Segment affected devices in isolated VLAN with strict access controls
  • Implement network monitoring for unusual API requests to scan_ap endpoint

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI command 'show version'

Check Version:

show version

Verify Fix Applied:

Verify firmware version is above vulnerable versions and test API endpoint with sanitized input

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /scan_ap endpoint
  • Multiple failed authentication attempts followed by scan_ap requests
  • System logs showing unexpected command execution

Network Indicators:

  • Unusual outbound connections from industrial switches
  • Traffic to scan_ap endpoint with special characters in parameters

SIEM Query:

source="switch_logs" AND (uri="/scan_ap" OR cmd="scan_ap") AND (param="*;*" OR param="*|*" OR param="*`*")

🔗 References

📤 Share & Export