Researchers have found 20 vulnerabilities in a wi-fi entry level generally utilized in industrial environments, six of that are vital.
An evaluation by Nozomi Networks Labs of model 1.6.2 of Advantech’s EKI-6333AC-2G industrial-grade wi-fi entry level discovered that these vulnerabilities pose important dangers, together with distant code execution (RCE) with root privileges.
Every of the vulnerabilities have been assigned a novel CVE identifier.
EKI-6333AC-2G is designed to offer secure, dual-band Wi-Fi connectivity throughout difficult industrial environments reminiscent of vehicle meeting strains and warehousing and distribution operations inside logistics.
It’s utilized in vital sectors together with manufacturing, power and public infrastructure.
Clients have been urged to improve their units to new firmware variations launched by Advantech to deal with these vulnerabilities:
- EKI-6333AC-2G: v1.6.5
- EKI-6333AC-2GD: v1.6.5
- EKI-6333AC-1GPO: v1.2.2
Learn now: CISA Warns of Crucial Software program Vulnerabilities in Industrial Gadgets
Crucial Vulnerabilities Can End in Machine Compromise
Six of the found vulnerabilities have been evaluated as vital and have been given a CVSS rating of 9.8.
They’ve been recognized as vital as a result of they will result in RCE with root privileges over the entry level, thereby totally compromising the confidentiality, integrity and availability of the affected units.
CVE-2024-50370, CVE-2024-50371, CVE-2024-50372, CVE-2024-50373, CVE-2024-50374 relate to improper neutralization of particular parts utilized in an working system (OS) command.
CVE-2024-50375 pertains to lacking authentication for vital perform.
The researchers recognized two potential assault vectors arising from the six vital vulnerabilities.
The primary can happen when the attackers are in a position to work together immediately with the entry level over the community (LAN/WAN), enabling them to craft malicious requests that focus on the weak service.
The second situation happens over the air, the place an attacker doesn’t must be related to the sufferer’s wired (LAN/WAN) or wi-fi (WLAN) community. Right here, they will exploit the wi-fi spectrum to execute code on the gadget just by being in shut bodily proximity to it.
Attackers have to be a detailed sufficient distance to broadcast beacon frames from a “Rogue Wi-fi Entry Level,” a pretend entry level that’s totally managed by the attacker and separate from the Advantech one. Beacon frames are used to synchronize the community and convey essential details about the community’s capabilities.
For such an over the air assault to happen, the attackers should even have administrator-level person entry the “Wi-Fi Analyzer” part of the Advantech internet utility.
This may be obtained by both gaining a sufferer’s credentials by way of phishing and social engineering makes an attempt or by merely ready for an administrator to go to the weak internet web page as could occur throughout common upkeep exercise.
Utilizing both of those assault strategies, attackers can perform quite a few actions within the community, together with persistent entry, information theft and disruption.