CVE-2024-50374

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to execute arbitrary operating system commands with root privileges on affected Advantech wireless access points. The exploit targets the default 'edgserver' service's 'capture_packages' operation, requiring no authentication. Organizations using vulnerable Advantech EKI-6333 series access points are affected.

💻 Affected Systems

Products:
  • Advantech EKI-6333AC-2G
  • Advantech EKI-6333AC-2GD
  • Advantech EKI-6333AC-1GPO
Versions: EKI-6333AC-2G <= 1.6.3, EKI-6333AC-2GD <= 1.6.3, EKI-6333AC-1GPO <= 1.2.1
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable 'edgserver' service is enabled by default with no authentication required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent backdoors, pivot to internal networks, exfiltrate data, or render devices inoperable.

🟠

Likely Case

Attackers gain full control of affected access points to intercept network traffic, modify configurations, or use as footholds for lateral movement.

🟢

If Mitigated

If properly segmented and monitored, impact limited to isolated network segments with potential for traffic interception but no lateral movement.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication on devices exposed to the internet.
🏢 Internal Only: HIGH - Even internally, the lack of authentication requirement makes exploitation trivial for any network-accessible attacker.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit as it requires no authentication and has a clear attack vector through the capture_packages operation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Advantech security advisory for specific patched versions

Vendor Advisory: https://www.advantech.com/support

Restart Required: Yes

Instructions:

1. Check current firmware version on affected devices
2. Download latest firmware from Advantech support portal
3. Backup current configuration
4. Apply firmware update following vendor instructions
5. Verify update successful and service functionality

🔧 Temporary Workarounds

Disable edgserver service

linux

Temporarily disable the vulnerable service until patching can be completed

ssh admin@device-ip
service edgserver stop
chkconfig edgserver off

Network segmentation and firewall rules

linux

Isolate affected devices and restrict access to edgserver service

iptables -A INPUT -p tcp --dport [edgserver-port] -j DROP
iptables -A INPUT -s trusted-network -p tcp --dport [edgserver-port] -j ACCEPT

🧯 If You Can't Patch

  • Immediately isolate affected devices from internet and critical internal networks
  • Implement strict network access controls to limit who can communicate with the edgserver service

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or SSH and compare against affected versions

Check Version:

ssh admin@device-ip 'cat /etc/version' or check via web interface

Verify Fix Applied:

Verify firmware version is above vulnerable versions and test that capture_packages operation no longer accepts arbitrary commands

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed or successful connections to edgserver service
  • Unexpected process creation with root privileges

Network Indicators:

  • Unusual traffic patterns to/from affected devices on edgserver port
  • Unexpected outbound connections from access points
  • Traffic containing shell metacharacters or command injection patterns

SIEM Query:

source="device-logs" AND (process="edgserver" OR command="capture_packages") AND (user="root" OR command="*;*" OR command="*|*")

🔗 References

📤 Share & Export