Cybersecurity researchers have uncovered nearly two dozen vulnerabilities in Advantech EKI industrial-grade wireless access points, posing serious risks to the confidentiality, integrity, and availability of affected devices. These flaws, some rated critical, enable attackers to bypass authentication and execute code with root privileges, potentially leading to full device compromise.
According to Nozomi Networks, the vulnerabilities have been responsibly disclosed and addressed in the following firmware updates:
1.6.5 (for EKI-6333AC-2G and EKI-6333AC-2GD)
1.2.2 (for EKI-6333AC-1GPO)
The Critical Flaws
Among the 20 vulnerabilities identified, six are deemed critical, with CVSS scores of 9.8, allowing attackers to:
Breakdown of Critical Vulnerabilities:
Additionally, a notable vulnerability, CVE-2024-50376 (CVSS score: 7.3), enables cross-site scripting (XSS) attacks. When chained with CVE-2024-50359 (CVSS score: 7.2, OS command injection requiring authentication), it can lead to arbitrary code execution with root privileges.
Attack Vector and Exploitation
The vulnerabilities exploit Wi-Fi access point functionality:
Impact:
Mitigation Measures
To safeguard against these vulnerabilities:
The discovery of these vulnerabilities in Advantech EKI wireless access points highlights the critical need for robust security in industrial IoT devices. By addressing these flaws promptly and adopting proactive measures, organizations can mitigate risks and protect their networks from potential breaches.
© 2016 - 2024 Red Secure Tech Ltd. Registered in England and Wales under Company Number: 15581067