Advisory

Nozomi Networks Labs reports critical flaws in Advantech's EKI industrial-grade wireless access points

Take action: If you are using Advantech EKI wireless access points, review the advisory and plan for urgent patching. A lot of these systems are in publicly accessble places and the vulnerabilities are critical. Your WPA2 password isn't great protection - someone will find a way onto the network.


Learn More

Nozomi Networks Labs has discovered and reported 20 significant vulnerabilities in Advantech's EKI series industrial-grade wireless access points. The research focused on version 1.6.2 of the EKI-6333AC-2G, but the vulnerabilities also affect EKI-6333AC-2GD and EKI-6333AC-1GPO models due to shared firmware code.

Vulnerability summary:

  • Six vulnerabilities with CVSS score 9.8
  • Five cases of OS Command Injection (CWE-78)
  • One Missing Authentication for Critical Function (CWE-306)
  • Cross-Site Scripting (CWE-79)
  • One External Control of System Configuration (CWE-15)
  • Hard-coded Credentials (CWE-798)

Attack Vectors:

  1. LAN/WAN Attack Vector: Allows attackers to exploit vulnerabilities through direct network interaction
  2. Over-the-Air Attack Vector: Enables exploitation through wireless proximity without network connection
CVE ID CWE CVSS v3.1 Base Score CVSS v3.1 Vector
CVE-2024-50370 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50371 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50372 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50373 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50374 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50375 Missing Authentication for Critical Function (CWE-306) 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50376 Improper Neutralization of Input During Web Page Generation ('Cross-Site Scripting') (CWE-79) 7.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
CVE-2024-50358 External Control of System or Configuration Setting (CWE-15) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50359 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50360 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50361 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50362 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50363 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50364 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50365 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50366 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50367 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50368 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50369 Improper Neutralization of Special Elements used in an OS Command (CWE-78) 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2024-50377 Use of Hard-coded Credentials (CWE-798) 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H

 

The devices are used in critical infrastructure, including manufacturing, energy facilities, and public infrastructure. A compromise of these devices could lead to significant disruptions in industrial operations, especially in automated systems like electric vehicle battery production lines where these access points are crucial for controlling rail-guided vehicles.

Organizations using these devices are strongly encouraged to update to the latest firmware versions immediately to protect against these vulnerabilities.

Nozomi Networks Labs reports critical flaws in Advantech's EKI industrial-grade wireless access points