CVE-2024-50369
📋 TL;DR
This OS command injection vulnerability in Advantech EKI-6333 series industrial wireless access points allows attackers to execute arbitrary commands on affected devices. Attackers can exploit this by sending specially crafted requests to the vulnerable 'multiple_ssid_htm' API endpoint. Organizations using these specific Advantech wireless access points with vulnerable firmware versions are affected.
💻 Affected Systems
- Advantech EKI-6333AC-2G
- Advantech EKI-6333AC-2GD
- Advantech EKI-6333AC-1GPO
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to execute arbitrary commands with root privileges, potentially leading to network infiltration, data exfiltration, or device bricking.
Likely Case
Remote code execution leading to device takeover, credential harvesting, or use as pivot point into industrial networks.
If Mitigated
Limited impact if devices are behind firewalls with strict network segmentation and API access controls.
🎯 Exploit Status
Based on the CVE description, exploitation appears straightforward as the vulnerability is in an API endpoint with insufficient input validation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: EKI-6333AC-2G > 1.6.3, EKI-6333AC-2GD > v1.6.3, EKI-6333AC-1GPO > v1.2.1
Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50369
Restart Required: Yes
Instructions:
1. Download latest firmware from Advantech support portal. 2. Backup device configuration. 3. Upload firmware via web interface. 4. Apply firmware update. 5. Reboot device. 6. Restore configuration if needed.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices in separate VLANs with strict firewall rules limiting access to management interfaces.
Access Control Lists
allImplement network ACLs to restrict access to the vulnerable API endpoint (port 80/443).
🧯 If You Can't Patch
- Segment affected devices in isolated network zones with strict firewall rules
- Implement network monitoring and intrusion detection for suspicious API requests
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface or SSH. Navigate to System > Firmware Information.
Check Version:
ssh admin@device_ip 'cat /etc/version' or check via web interface
Verify Fix Applied:
Verify firmware version is above vulnerable versions: EKI-6333AC-2G > 1.6.3, EKI-6333AC-2GD > v1.6.3, EKI-6333AC-1GPO > v1.2.1
📡 Detection & Monitoring
Log Indicators:
- Unusual API requests to 'multiple_ssid_htm' endpoint
- Suspicious command execution patterns in system logs
- Multiple failed authentication attempts followed by API access
Network Indicators:
- Unusual outbound connections from industrial devices
- Traffic to unexpected ports from affected devices
- HTTP requests with shell metacharacters in parameters
SIEM Query:
source="advantech_logs" AND (uri="*multiple_ssid_htm*" AND (param="*;*" OR param="*|*" OR param="*`*" OR param="*$(*"))