First published: Mon May 08 2023(Updated: )
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request.
Credit: office@cyberdanube.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech Eki-1521 Firmware | <=1.21 | |
Advantech Eki-1521 | ||
Advantech Eki-1522 Firmware | <=1.21 | |
Advantech Eki-1522 | ||
Advantech Eki-1524 Firmware | <=1.21 | |
Advantech EKI-1524 |
Install firmware 1.24 to fix the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this command injection vulnerability is CVE-2023-2573.
Advantech EKI-1524, EKI-1522, and EKI-1521 devices through version 1.21 are affected by this command injection vulnerability.
This command injection vulnerability can be triggered by authenticated users via a crafted POST request in the NTP server input field.
CVE-2023-2573 has a severity rating of 8.8 (high).
Yes, Advantech has released firmware updates to address this command injection vulnerability. Refer to the manufacturer's support website for the appropriate firmware update.