Nozomi Networks Labs reports critical flaws in Advantech's EKI industrial-grade wireless access points
Take action: If you are using Advantech EKI wireless access points, review the advisory and plan for urgent patching. A lot of these systems are in publicly accessble places and the vulnerabilities are critical. Your WPA2 password isn't great protection - someone will find a way onto the network.
Learn More
Nozomi Networks Labs has discovered and reported 20 significant vulnerabilities in Advantech's EKI series industrial-grade wireless access points. The research focused on version 1.6.2 of the EKI-6333AC-2G, but the vulnerabilities also affect EKI-6333AC-2GD and EKI-6333AC-1GPO models due to shared firmware code.
Vulnerability summary:
- Six vulnerabilities with CVSS score 9.8
- Five cases of OS Command Injection (CWE-78)
- One Missing Authentication for Critical Function (CWE-306)
- Cross-Site Scripting (CWE-79)
- One External Control of System Configuration (CWE-15)
- Hard-coded Credentials (CWE-798)
Attack Vectors:
- LAN/WAN Attack Vector: Allows attackers to exploit vulnerabilities through direct network interaction
- Over-the-Air Attack Vector: Enables exploitation through wireless proximity without network connection
| CVE ID | CWE | CVSS v3.1 Base Score | CVSS v3.1 Vector |
|---|---|---|---|
| CVE-2024-50370 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50371 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50372 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50373 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50374 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50375 | Missing Authentication for Critical Function (CWE-306) | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50376 | Improper Neutralization of Input During Web Page Generation ('Cross-Site Scripting') (CWE-79) | 7.3 | CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H |
| CVE-2024-50358 | External Control of System or Configuration Setting (CWE-15) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50359 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50360 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50361 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50362 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50363 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50364 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50365 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50366 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50367 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50368 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50369 | Improper Neutralization of Special Elements used in an OS Command (CWE-78) | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CVE-2024-50377 | Use of Hard-coded Credentials (CWE-798) | 6.5 | CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H |
The devices are used in critical infrastructure, including manufacturing, energy facilities, and public infrastructure. A compromise of these devices could lead to significant disruptions in industrial operations, especially in automated systems like electric vehicle battery production lines where these access points are crucial for controlling rail-guided vehicles.
Organizations using these devices are strongly encouraged to update to the latest firmware versions immediately to protect against these vulnerabilities.