You are visiting the Akuvox Global site.

Click here to visit Akuvox's Australian website.

  • Home
  • >
  • Security Advisory: Akuvox E11 Series Product Vulnerability Disclosure

Security Advisory: Akuvox E11 Series Product Vulnerability Disclosure

1. Vulnerability Overview

Akuvox prioritizes product security and user privacy protection. Security researchers reported multiple vulnerabilities in the E11 series products, affecting encryption mechanisms, authentication controls, sensitive file protection, and communication protocol security. Akuvox has released remediation patches and recommends users upgrade systems promptly.


2. Vulnerability Details

CVE ID Vulnerability Description Remediation Measure
CVE-2023-0343 Akuvox E11 contains a function that encrypts messages which are then forwarded. The IV vector and the key are static, and this may allow an attacker to decrypt messages. Upgrade to dynamic IV AES256 encryption scheme.
CVE-2023-0355 Akuvox E11 uses a hard-coded cryptographic key, which could allow an attacker to decrypt sensitive information. Switch to dynamically reading key from encrypted protected file.
CVE-2023-0354 The Akuvox E11 web server can be accessed without any user authentication, and this could allow an attacker to access sensitive information, as well as create and download packet captures with known default URLs. Enforce authentication on all risky operation URLs.
CVE-2023-0353 Akuvox E11 uses a weak encryption algorithm for stored passwords and uses a hard-coded password for decryption which could allow the encrypted passwords to be decrypted from the configuration file. Upgrade password storage algorithm to hash-based one-way verification and remove hard-coded decryption dependency.
CVE-2023-0352 The Akuvox E11 password recovery webpage can be accessed without authentication, and an attacker could download the device key file. An attacker could then use this page to reset the password back to the default. Disable the insecure password recovery function.
CVE-2023-0351 The Akuvox E11 web server backend library allows command injection in the device phone-book contacts functionality. This could allow an attacker to upload files with executable command instructions. Disable the affected hidden page; review and fix other pages with similar risks.
CVE-2023-0350 Akuvox E11 does not ensure that a file extension is associated with the file provided. This could allow an attacker to upload a file to the device by changing the extension of a malicious file to an accepted file type. Strengthen file upload restrictions across all pages and enforce UUID-based filename uniqueness on the backend.
CVE-2023-0349 The Akuvox E11 libvoice library provides unauthenticated access to the camera capture for image and video. This could allow an attacker to view and record image and video from the camera. Enforce mandatory digest authentication for web-based video access.
CVE-2023-0348 Akuvox E11 allows direct SIP calls. No access control is enforced by the SIP servers, which could allow an attacker to contact any device within Akuvox to call any other device. Implement terminal call access restrictions between different logical zones.
CVE-2023-0347 The Akuvox E11 Media Access Control (MAC) address, a primary identifier, combined with the Akuvox E11 IP address, could allow an attacker to identify the device on the Akuvox cloud. Anonymize device identification information and enable HTTPS.
CVE-2023-0346 Akuvox E11 cloud login is performed through an unencrypted HTTP connection. An attacker could gain access to the Akuvox cloud and device if the MAC address of a device is known. Switch to HTTPS encrypted transport protocol.
CVE-2023-0345 The Akuvox E11 secure shell (SSH) server is enabled by default and can be accessed by the root user. This password cannot be changed by the user. Disable SSH by default in firmware; auto-disable after restart even if temporarily enabled for debugging; store related keys in encrypted form.
CVE-2023-0344 Akuvox E11 appears to be using a custom version of dropbear SSH server. This server allows an insecure option that by default is not in the official dropbear SSH server. Fixed together with CVE-2023-0345: disable SSH by default, auto-disable after restart, and encrypt stored keys.

3. Affected Versions

  • Product Name: E11
  • Affected Versions: V111.30.2.19 and earlier

4. Remediation and Recommendations

Firmware Upgrade

Akuvox strongly recommends all affected users upgrade firmware immediately.


Target Version: V111.30.2.22


Environment Hardening

Before completing the firmware upgrade, administrators are advised to isolate devices in restricted network zones and use firewalls to block unnecessary external access to management ports.

5. Acknowledgments

Thanks to Vera Mens and Amir Preminger from Claroty Research for discovering these vulnerabilities, reporting them to CISA, and helping Akuvox continuously improve product security.

6. Contact Us

To report any security issues in Akuvox products, please contact:

Security contact: asrc@akuvox.com

Reference SNs: ASRC-202303-01 to ASRC-202303-13

<%=cnzz%>