Authenticated Command Injection
CVE-2023-2573
8.8HIGH
Summary
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request.
Affected Version(s)
EKI-1524 <= 1.21
EKI-1522 <= 1.21
EKI-1521 <= 1.21
Refferences
https://www.advantech.com/en/support/details/firmware?id=...
patch
https://www.advantech.com/en/support/details/firmware?id=...
patch
https://www.advantech.com/en/support/details/firmware?id=...
patch
https://cyberdanube.com/en/multiple-vulnerabilities-in-ad...
third-party-advisory
http://seclists.org/fulldisclosure/2023/May/4
http://packetstormsecurity.com/files/172307/Advantech-EKI...
EPSS Score
3% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability Reserved
Vulnerability published
Collectors
NVD DatabaseMitre Database
Credit
S. Dietz (CyberDanube)
T. Weber (CyberDanube)