Researchers at Nozomi Networks Labs have discovered numerous vulnerabilities in an Advantech Wi-Fi access point commonly used in demanding industrial environments. A total of 20 security flaws were found in firmware version 1.6.2 of Advantech's EKI-6333AC-2G wireless access point. The device is widely deployed across industries such as warehousing, distribution, and automobile manufacturing. Several of the vulnerabilities, rated as critical, could enable attackers to obtain root access and execute code remotely. There are two main methods for exploiting these vulnerabilities. Attackers can either gain physical access to the device and send crafted malicious requests or exploit the vulnerabilities over Wi-Fi from a nearby location to execute code remotely. Successful exploitation could allow attackers to install backdoors, access internal network resources, disrupt production through denial-of-service attacks, or move laterally within the network. Once attackers achieve lateral movement, they could intercept network credentials using man-in-the-middle attacks. Dean Frye, a solutions architect at Nozomi Networks, explained that these vulnerabilities highlight the complexity of attack chains, which often require both physical security breaches and multi-stage technical exploitation. Cross-site scripting (XSS) vulnerabilities are a key issue that should be identified during pre-release software testing. IoT manufacturers need to prioritize security over rapid product release, balancing cost with quality assurance. The disclosed vulnerabilities also emphasize the role of social engineering in facilitating such attacks. As a vulnerability numbering authority, Nozomi Networks remains dedicated to responsible disclosure of security flaws and to minimizing risks in automation and control systems. Advantech has responded by releasing firmware updates to address the vulnerabilities. Firmware version 1.6.5 is now available for the EKI-6333AC-2G and EKI-6333AC-2GD models, while version 1.2.2 has been released for the EKI-6333AC-1GPO model. These updates were issued following a collaborative disclosure process between Advantech and Nozomi Networks.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...