CVE-2024-50365
📋 TL;DR
This OS command injection vulnerability in Advantech EKI-6333 series industrial switches allows attackers to execute arbitrary commands on affected devices by exploiting unsanitized parameters in the lan_apply API. Organizations using these switches in industrial control systems or network infrastructure are affected. Successful exploitation could lead to complete device compromise.
💻 Affected Systems
- Advantech EKI-6333AC-2G
- Advantech EKI-6333AC-2GD
- Advantech EKI-6333AC-1GPO
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device takeover leading to network disruption, lateral movement to other systems, and potential compromise of industrial control systems.
Likely Case
Unauthorized command execution allowing configuration changes, data exfiltration, or device disruption.
If Mitigated
Limited impact with proper network segmentation and access controls preventing exploitation attempts.
🎯 Exploit Status
Exploitation requires access to the lan_apply API endpoint. No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Advantech security advisory for specific fixed versions
Vendor Advisory: https://www.advantech.com/support
Restart Required: Yes
Instructions:
1. Check current firmware version using web interface or CLI
2. Download latest firmware from Advantech support portal
3. Upload firmware via web interface
4. Apply update and restart device
5. Verify update was successful
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices in separate VLANs with strict firewall rules
Access Control
linuxRestrict access to device management interfaces to trusted IP addresses only
iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Disable web interface and API access if not required
- Implement strict network segmentation and monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface at System > Firmware or via CLI command 'show version'
Check Version:
show version
Verify Fix Applied:
Verify firmware version is above affected versions and test lan_apply API with sanitized input
📡 Detection & Monitoring
Log Indicators:
- Unusual API calls to lan_apply endpoint
- Suspicious command execution in system logs
- Multiple failed authentication attempts
Network Indicators:
- Unusual traffic patterns to device management ports
- Unexpected outbound connections from device
SIEM Query:
source="advantech-switch" AND (uri="*lan_apply*" OR command="*;*" OR command="*|*" OR command="*`*")