CVE-2024-50361

7.2 HIGH

📋 TL;DR

This OS command injection vulnerability in Advantech EKI-6333 series industrial switches allows attackers to execute arbitrary commands on affected devices by exploiting unsanitized parameters in the certificate_file_remove API. Successful exploitation could lead to complete device compromise, data theft, or network disruption. Organizations using these specific Advantech switch models with vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Advantech EKI-6333AC-2G
  • Advantech EKI-6333AC-2GD
  • Advantech EKI-6333AC-1GPO
Versions: EKI-6333AC-2G <= 1.6.3, EKI-6333AC-2GD <= v1.6.3, EKI-6333AC-1GPO <= v1.2.1
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web management interface's certificate_file_remove API endpoint. Devices must have web interface enabled and accessible to attackers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to persistent backdoor installation, lateral movement within industrial networks, manipulation of network traffic, and potential physical safety risks in industrial environments.

🟠

Likely Case

Unauthorized command execution leading to device configuration changes, service disruption, credential theft, and potential use as pivot point for further network attacks.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring preventing successful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to the web interface. The vulnerability is in a specific API endpoint with unsanitized parameters that get passed to system commands.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Advantech security advisory for specific patched versions

Vendor Advisory: https://www.advantech.com/support

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from Advantech support portal. 3. Backup device configuration. 4. Upload and apply firmware update via web interface. 5. Verify update successful and restore configuration if needed.

🔧 Temporary Workarounds

Disable Web Interface

all

Disable the web management interface if not required for operations

Use CLI: configure terminal
no ip http server
end
write memory

Restrict Network Access

all

Implement strict network access controls to limit who can reach the management interface

Use ACLs: access-list 100 permit ip [trusted-networks] any
interface vlan 1
ip access-group 100 in

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from untrusted networks
  • Enable detailed logging and monitoring for suspicious API calls to certificate_file_remove endpoint

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > System Information) or CLI (show version). Compare against vulnerable versions listed in affected systems.

Check Version:

show version (CLI) or check System Information in web interface

Verify Fix Applied:

Verify firmware version is above vulnerable versions. Test certificate_file_remove functionality with controlled inputs to ensure proper sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual certificate_file_remove API calls
  • Multiple failed authentication attempts followed by successful login
  • Suspicious command execution in system logs

Network Indicators:

  • Unusual traffic patterns from switch management IP
  • Unexpected outbound connections from switch
  • HTTP requests to certificate_file_remove endpoint with unusual parameters

SIEM Query:

source="switch-logs" AND ("certificate_file_remove" OR "os command injection" OR suspicious parameters in API calls)

🔗 References

📤 Share & Export