As industrial networks expand into wireless domains, new vulnerabilities are exposing critical infrastructure to potential cyber threats. With this evolution, safeguarding wireless devices within industrial settings has become essential. Since the launch of Guardian Air, Nozomi Networks has emphasized the need for stronger protections, particularly on wireless fronts.
Recognizing this, Nozomi Networks Labs has conducted an analysis of version 1.6.2 of the EKI-6333AC-2G industrial-grade wireless access point. Thanks to its resilience in challenging environments, this device is utilized across diverse sectors, ranging from automobile assembly lines up to warehousing and distribution operations within logistics. Our analysis identified 20 vulnerabilities, each assigned a unique CVE identifier. These vulnerabilities pose significant risks, allowing unauthenticated remote code execution with root privileges, thereby fully compromising the confidentiality, integrity, and availability of the affected devices.
Following the triage and confirmation of these issues, Advantech has released firmware version 1.6.5 to address the vulnerabilities on EKI-6333AC-2G and EKI-6333AC-2GD and firmware version 1.2.2 for EKI-6333AC-1GPO. Through the responsible disclosure process coordinated with Advantech, the EKI-6333AC-2GD and EKI-6333AC-1GPO devices were also confirmed to be impacted by these vulnerabilities due to shared firmware code.
This article outlines the identified security vulnerabilities, discusses their potential impact, and provides recommended mitigation strategies. For a comprehensive list of affected devices and versions, please refer to the section below, “Vulnerability List and Affected Versions”.
Research Scope
The EKI-6333AC-2G by Advantech (Figure 1) is an industrial-grade wireless access point designed for challenging environments, providing stable, dual-band Wi-Fi connectivity. It is particularly suited for mission-critical applications within industrial settings, like manufacturing, energy, and public infrastructure, where durability and secure connections are essential.
An example of how such wireless devices are used is detailed in Advantech's case study, explaining how an electric vehicle (EV) manufacturer managed to automate its battery production line leveraging Wi-Fi-enabled rail-guided vehicles (RGVs). To achieve this, the Advantech’s EKI-6333AC-2G and EKI-1361 solutions were employed to enable RGVs in navigating into complex production layouts, where possible interference may arise and where smooth real-time control and communication is mandatory for safety purposes (Figure 2).
Our research focused on EKI-6333AC-2G key operational areas, including its connectivity protocols, data handling, and security mechanisms, critical to ensuring uninterrupted, secure communication in industrial environments. These areas present potential entry points for threat actors both at the wired level and also within the wireless spectrum.
What Are the Impacts of These Vulnerabilities?
Several of these vulnerabilities have been evaluated as critical, given that they could ultimately lead to remote code execution (RCE) with root privileges over the access point. This would allow a threat actor to compromise the device’s confidentiality, integrity and availability. Two possible attack vectors were identified:
- Attack Vector 1 (LAN/WAN): In situations where an attacker can interact directly with the access point over the network, they can exploit these vulnerabilities by crafting malicious requests that target the vulnerable service.
- Attack Vector 2 (Over-the-Air): An additional scenario occurs over the air, where an attacker does not need to be connected to a wired (LAN/WAN) or wireless (WLAN) network. They could exploit the wireless spectrum to execute code on the device simply by being in physical proximity to it. This scenario is discussed further in the “Vulnerability Spotlight” section below.
Given these severity levels, a malicious user could achieve the following outcomes:
- Persistent access to internal resources: Once code execution on the device is achieved, malicious users may implant a backdoor to maintain persistent access. This setup could enable scenarios where initial access is gained through malware infection (such as via email), and persistence is established by compromising the Advantech device.
- Denial of Service (DoS): In scenarios like those outlined in the “Research Scope” section above—where a vulnerable access point serves as the backbone network to control wireless RGVs navigating complex production layouts—the ability to tamper with these critical access points could significantly disrupt automation processes on production lines.
- Lateral movement: Gaining root privileges on the device enables the attacker to repurpose the access point as a fully functional Linux workstation, providing a new foothold for further exploration and penetration within the network. This can be accomplished, for instance, by conducting Man-in-the-Middle attacks to capture credentials transmitted over unencrypted protocols or by exploiting known vulnerabilities in unpatched devices using publicly available exploits.
Vulnerability List and Affected Versions
The table below lists the vulnerabilities confirmed to be present in the following devices: EKI-6333AC-2G, EKI-6333AC-2GD and EKI-6333AC-1GPO. Nozomi Networks Labs conducted our vulnerability research activity on firmware version 1.6.2. Results are sorted by CVSS 3.1 score from most to least severe.
Vulnerability Spotlight
For this blog’s “Vulnerability Spotlight,” we chose to highlight an over the air attack scenario leading to arbitrary code execution by chaining two specific vulnerabilities, rather than focusing on discovered command injections classified as critical. This scenario, in our opinion, is more interesting since it involves the wireless spectrum as possible attack vector and provides a different perspective on how attackers might choose to target manufacturing facilities typically considered “safer” due to higher isolation.
The attack combines a “CWE-79 – Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting)” (CVE-2024-50376), which can be leveraged by an attacker without even being connected to a corporate network, with a “CWE-78 – Improper Neutralization of Special Elements Used in an OS Command” (CVE-2024-50359), which would typically require authentication if exploited independently.
Before describing how the attack can be performed, it is important to briefly detail how a wireless access point works. In simple terms, a Wi-Fi access point acts as a bridge between the wireless spectrum and a wired network. The access point periodically sends clear text messages over the air called "beacon frames." These frames announce the presence of the network, communicate essential details such as the network name (SSID) and the signal power, and guide end-user devices like laptops and smartphones in discovering and maintaining already established connections. All devices supporting wireless connectivity are therefore equipped with dedicated hardware and software to implement a logic that allows them to receive, parse and interpret beacon frames and all the other types of frames involved in a Wi-Fi communication (a similar logic can also be applied for Bluetooth communications). If a vulnerability is found in any of these processes – such as in the case of the Advantech access point – this weakness could compromise the security of the device itself. Furthermore, such a vulnerability could have cascading effects, potentially leading to an immediate and broader security impact on the rest of the network, as the compromised device might act as an entry point for attackers.
With this brief explanation we can now better understand how CVE-2024-50376 and CVE-2024-50376 can be exploited. To begin, a malicious user must be in physical proximity to the Advantech access point, at a distance that is sufficient for an attacker to broadcast information from a Rogue Wireless Access Point. With this term we refer to a fake access point that is fully controlled by the attacker and is separate from the Advantech one. Leveraging the rogue access point, the attacker can broadcast arbitrary “beacon frames” that are received and captured from surrounding devices with wireless capabilities. To make sure that the rogue wireless frames are visible to the Advantech device, attackers can either place themselves close to the access point or leverage dedicated antennas to propagate the rogue signal across longer distances. In both cases, it is important to understand that threat actors remained external and were never connected to the company network that was exposed via Advantech’s access point.
Supposing that the physical proximity requirement is met, we now have to meet a second requirement: an administrator-level user visiting the “Wi-Fi Analyzer” section of the Advantech web application shown in Figure 3.
This step could be obtained by either inducing a victim through phishing and social engineering attempts or by simply waiting for an administrator to visit the vulnerable web page as may happen during regular maintenance activity.
When visiting the “Wi-Fi Analyzer” section, the web application automatically embeds information received through beacon frames without proper sanitization against special characters. One such piece of information an attacker could broadcast through its rogue access point is the SSID (commonly referred to as the “Wi-Fi network name”). The attacker could therefore insert a JavaScript payload as SSID for its rogue access point and exploit CVE-2024-50376 to trigger a Cross-Site Scripting (XSS) vulnerability inside the web application. This means that an external attacker can inject arbitrary JavaScript code in the victim’s browser and therefore perform arbitrary operations as if it was connected directly to the user session. Figure 4 displays as PoC an alert message box that the attacker is capable of triggering in the victim’s browser by controlling the malicious SSID.
Having reached this stage, the attacker may inject a complete JavaScript-based C&C inside the victim’s browser to perform arbitrary operations leveraging for example readily available tools such as the Browser Exploitation Framework (BeEF). Although the Wi-Fi standard limits to 32 characters the length of SSIDs it was proved to be possible to circumvent this limitation, but we have chosen to omit further details.
While the attacker would already be able to control the device’s settings via its web interface, they could take it a step further by chaining CVE-2024-50359. This vulnerability involves an authenticated command injection that can be activated through the administrative panel, allowing for deeper system manipulation. Since the process responsible for executing the web application runs with root privileges on the Advantech device, no particular restrictions are encountered in the execution of arbitrary commands injected over the device at operating system level. One such command could be to allow to a persistent connection back to an internet-facing C&C machine to be established through a reverse shell. This would enable attackers to gain remote control over the compromised device, execute commands, and further infiltrate the network, extracting data or deploying additional malicious scripts.
Figure 5 displays the result of the attack where a shell with root privileges was obtained on the device.
The following diagram summarizes all the steps involved in the attack chain, starting from an attacker who is not initially connected to the network and ultimately leading to impacts on a production line.
Remediations
After these vulnerabilities were reported, Advantech promptly addressed them by releasing the following firmware versions:
- EKI-6333AC-2G: v1.6.5
- EKI-6333AC-2GD: v1.6.5
- EKI-6333AC-1GPO: v1.2.2
We encourage all asset owners to upgrade to this latest version to protect their network and devices from unauthorized access. In addition, Figure 7 highlights the enhanced detection capabilities introduced by Nozomi Networks’ Guardian Air wireless sensor, demonstrating its effectiveness in detecting and reporting alerts for these types of over the air attacks that would otherwise go undetected by standard monitoring solutions.