{"Remotely Exploitable OS Command Injection Vulnerability Affects Advantech Devices"}
CVE-2024-50372
9.8CRITICAL
Summary
An OS Command Injection vulnerability exists in specific Advantech EKI series devices that allows remote unauthenticated users to execute malicious commands with root privileges. This security flaw affects devices running certain versions, specifically EKI-6333AC-2G (up to 1.6.3), EKI-6333AC-2GD (up to 1.6.3), and EKI-6333AC-1GPO (up to 1.2.1). The vulnerability arises from improper handling of elements used in OS command execution and is linked to the 'backup_config_to_utility' function within the default 'edgserver' service. As the service is accessible without authentication, attackers can exploit this weakness to gain control over the device.
Affected Version(s)
EKI-6333AC-1GPO 0
EKI-6333AC-2G 0
EKI-6333AC-2GD 0
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Diego Zaffaroni of Nozomi Networks found this bug during a security research activity.