ID

VAR-202308-2104


CVE

CVE-2023-4202


TITLE

Advantech EKI-1524-CE / EKI-1522 / EKI-1521 Cross Site Scripting

Trust: 0.1

sources: PACKETSTORM: 174153

DESCRIPTION

Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stored Cross-Site Scripting vulnerability, which can be triggered by authenticated users in the device name field of the web-interface. St. P\xf6lten UAS ------------------------------------------------------------------------------- title| Multiple XSS in Advantech product| Advantech EKI-1524-CE series, EKI-1522 series, | EKI-1521 series vulnerable version| <=1.21 (CVE-2023-4202), <=1.24 (CVE-2023-4203) fixed version| 1.26 CVE number| CVE-2023-4202, CVE-2023-4203 impact| Medium homepage| https://advantech.com found| 2023-05-04 by| R. Haas, A. Resanovic, T. Etzenberger, M. Bineder | This vulnerability was discovery during research at | St. P\xf6lten UAS, supported and coordinated by CyberDanube. | | https://fhstp.ac.at | https://cyberdanube.com ------------------------------------------------------------------------------- Vendor description ------------------------------------------------------------------------------- \x93Advantech\x92s corporate vision is to enable an intelligent planet. The company is a global leader in the fields of IoT intelligent systems and embedded platforms. To embrace the trends of IoT, big data, and artificial intelligence, Advantech promotes IoT hardware and software solutions with the Edge Intelligence WISE-PaaS core to assist business partners and clients in connecting their industrial chains. Advantech is also working with business partners to co-create business ecosystems that accelerate the goal of industrial intelligence.\x94 Source: https://www.advantech.com/en/about Vulnerable versions ------------------------------------------------------------------------------- EKI-1524-CE series / 1.21 (CVE-2023-4202) EKI-1522-CE series / 1.21 (CVE-2023-4202) EKI-1521-CE series / 1.21 (CVE-2023-4202) EKI-1524-CE series / 1.24 (CVE-2023-4203) EKI-1522-CE series / 1.24 (CVE-2023-4203) EKI-1521-CE series / 1.24 (CVE-2023-4203) Vulnerability overview ------------------------------------------------------------------------------- 1) Stored Cross-Site Scripting (XSS) (CVE-2023-4202, CVE-2023-4203) Two stored cross-site scripting vulnerabilities has been identified in the firmware of the device. The first XSS was identified in the "Device Name" field and the second XSS was found in the "Ping" tool. This can be exploited in the context of a victim's session. 1.1) Stored XSS in Device Name CVE-2023-4202 The first vulnerability can be triggerd by setting the device name ("System->Device Name") to the following value: "><script>alert("document.cookie")</script> This code prints out the cached cookies to the screen. 1.2) Stored XSS in Ping Function CVE-2023-4203 The second XSS vulnerability can be found in "Tools->Ping". The following GET request prints the current cached cookies of a user's session to the screen. http://$IP/cgi-bin/ping.sh?random_num=2013&ip=172.16.0.141%3b%20<script>alert(1)</script>&size=56&count=1&interface=eth0&_=1682793104513 An alternative to the used payload is using "onmouseover" event tags. In this case it prints out the number "1337": " onmousemove="alert(1337)" The vulnerability was manually verified on an emulated device by using the MEDUSA scalable firmware runtime (https://medusa.cyberdanube.com). Solution ------------------------------------------------------------------------------- Upgrade to the newest available firmware. Workaround ------------------------------------------------------------------------------- None. Recommendation ------------------------------------------------------------------------------- Advantech customers are advised to upgrade the firware to the latest available version. Contact Timeline ------------------------------------------------------------------------------- 2023-05-16: Contacting vendor via security contact. 2023-05-24: Contact stated that issue 1.1) is solved after firmware v1.21. The contact is trying to reproduce issue 1.2; Gave advice to reproduce issue. 2023-05-25: Contact stated that new firmware should resolve the issue. 2023-06-03: Sent new payload to the vendor. 2023-06-05: Vendor asked for clarification; Sent further explaination to the contact; Vendor contact said he knows a solution. 2023-06-22: Asked for an update; Contact stated that the beta firmware should resolve the issues. 2023-06-27: Asked for the release date. 2023-07-04: Contact stated, that they are currently doing QA tests. 2023-07-06: Asked if issue 1.1 is really resolved to be released; Vendor stated that it can be published. 2023-07-17: Assigned CVE numbers for the issues. Asked for an update. 2023-07-18: Vendor contact stated that the firmware will be released end of July. 2023-08-07: Asked contact for the new firmware version. 2023-08-08: Received version 1.26 as the official released firmware with fixes. Coordinated release of security advisory. Web: https://www.fhstp.ac.at/ Twitter: https://twitter.com/fh_stpoelten Mail: mis at fhstp dot ac dot at EOF T. Weber / @2023

Trust: 0.99

sources: NVD: CVE-2023-4202 // PACKETSTORM: 174153

AFFECTED PRODUCTS

vendor:advantechmodel:eki-1522scope:lteversion:1.21

Trust: 1.0

vendor:advantechmodel:eki-1521scope:lteversion:1.21

Trust: 1.0

vendor:advantechmodel:eki-1524scope:lteversion:1.21

Trust: 1.0

sources: NVD: CVE-2023-4202

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-4202
value: MEDIUM

Trust: 1.0

office@cyberdanube.com: CVE-2023-4202
value: CRITICAL

Trust: 1.0

nvd@nist.gov: CVE-2023-4202
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.1

Trust: 1.0

office@cyberdanube.com: CVE-2023-4202
baseSeverity: CRITICAL
baseScore: 9.0
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.3
impactScore: 6.0
version: 3.1

Trust: 1.0

sources: NVD: CVE-2023-4202 // NVD: CVE-2023-4202

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

sources: NVD: CVE-2023-4202

TYPE

xss

Trust: 0.1

sources: PACKETSTORM: 174153

EXTERNAL IDS

db:NVDid:CVE-2023-4202

Trust: 1.1

db:PACKETSTORMid:174153

Trust: 1.1

sources: PACKETSTORM: 174153 // NVD: CVE-2023-4202

REFERENCES

url:http://packetstormsecurity.com/files/174153/advantech-eki-1524-ce-eki-1522-eki-1521-cross-site-scripting.html

Trust: 1.0

url:http://seclists.org/fulldisclosure/2023/aug/13

Trust: 1.0

url:https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/

Trust: 1.0

url:https://fhstp.ac.at

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-4203

Trust: 0.1

url:http://$ip/cgi-bin/ping.sh?random_num=2013&ip=172.16.0.141%3b%20<script>alert(1)</script>&size=56&count=1&interface=eth0&_=1682793104513

Trust: 0.1

url:https://cyberdanube.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-4202

Trust: 0.1

url:https://twitter.com/fh_stpoelten

Trust: 0.1

url:https://www.advantech.com/en/about

Trust: 0.1

url:https://advantech.com

Trust: 0.1

url:https://medusa.cyberdanube.com).

Trust: 0.1

url:https://www.fhstp.ac.at/

Trust: 0.1

sources: PACKETSTORM: 174153 // NVD: CVE-2023-4202

CREDITS

T. Weber, A. Resanovic, T. Etzenberger, M. Bineder, R. Haas

Trust: 0.1

sources: PACKETSTORM: 174153

SOURCES

db:PACKETSTORMid:174153
db:NVDid:CVE-2023-4202

LAST UPDATE DATE

2024-08-14T13:20:00.484000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2023-4202date:2023-08-14T19:15:14.220

SOURCES RELEASE DATE

db:PACKETSTORMid:174153date:2023-08-14T17:13:30
db:NVDid:CVE-2023-4202date:2023-08-08T11:15:11.980