Search criteria
97 vulnerabilities found for WebAccess/SCADA by Advantech
VAR-201906-1029
Vulnerability from variot - Updated: 2024-07-23 22:28In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. WebAccess/SCADA Is NULL A vulnerability related to pointer dereference exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. Multiple heap-based buffer-overflow vulnerabilities 4. An information disclosure vulnerability 5. Multiple remote-code execution vulnerabilities An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (â??../â??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. Advantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "webaccess",
"scope": null,
"trust": 8.4,
"vendor": "advantech",
"version": null
},
{
"_id": null,
"model": "webaccess",
"scope": "lte",
"trust": 1.8,
"vendor": "advantech",
"version": "8.3.5"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=8.3.5"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.1"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.0"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "7.2"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.4.1"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-598"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-615"
},
{
"db": "ZDI",
"id": "ZDI-19-608"
},
{
"db": "ZDI",
"id": "ZDI-19-618"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "BID",
"id": "108923"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005812"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.3.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"credits": {
"_id": null,
"data": "Natnael Samson (@NattiSamson)",
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-598"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-615"
},
{
"db": "ZDI",
"id": "ZDI-19-608"
},
{
"db": "ZDI",
"id": "ZDI-19-618"
}
],
"trust": 8.4
},
"cve": "CVE-2019-10993",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-10993",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32473",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-142595",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-10993",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 8.4,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-10993",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2019-10993",
"trust": 8.4,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2019-10993",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-32473",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201906-1077",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-142595",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-598"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-615"
},
{
"db": "ZDI",
"id": "ZDI-19-608"
},
{
"db": "ZDI",
"id": "ZDI-19-618"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "VULHUB",
"id": "VHN-142595"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005812"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"description": {
"_id": null,
"data": "In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. WebAccess/SCADA Is NULL A vulnerability related to pointer dereference exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities:\n1. A directory-traversal vulnerability\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. Multiple heap-based buffer-overflow vulnerabilities\n4. An information disclosure vulnerability\n5. Multiple remote-code execution vulnerabilities\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (\u00e2??../\u00e2??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. \nAdvantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-10993"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005812"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-618"
},
{
"db": "ZDI",
"id": "ZDI-19-608"
},
{
"db": "ZDI",
"id": "ZDI-19-615"
},
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-598"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "BID",
"id": "108923"
},
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "VULHUB",
"id": "VHN-142595"
}
],
"trust": 10.26
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2019-10993",
"trust": 12.0
},
{
"db": "ICS CERT",
"id": "ICSA-19-178-05",
"trust": 2.8
},
{
"db": "ZDI",
"id": "ZDI-19-613",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-616",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-606",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-598",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-605",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-615",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-618",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-612",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-611",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-602",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-607",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-614",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-597",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-617",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-603",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-601",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-623",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077",
"trust": 0.9
},
{
"db": "BID",
"id": "108923",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32473",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-599",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-610",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-595",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-596",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-608",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005812",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8129",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8146",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8143",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8150",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8139",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8118",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8128",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8138",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8126",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8148",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8141",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8152",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.2350",
"trust": 0.6
},
{
"db": "IVD",
"id": "D5DCD84F-1ACA-4DC3-AC16-D5C7C3DD4D07",
"trust": 0.2
},
{
"db": "ZDI",
"id": "ZDI-19-604",
"trust": 0.1
},
{
"db": "ZDI",
"id": "ZDI-19-593",
"trust": 0.1
},
{
"db": "ZDI",
"id": "ZDI-19-609",
"trust": 0.1
},
{
"db": "ZDI",
"id": "ZDI-19-600",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-142595",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-598"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-615"
},
{
"db": "ZDI",
"id": "ZDI-19-608"
},
{
"db": "ZDI",
"id": "ZDI-19-618"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "VULHUB",
"id": "VHN-142595"
},
{
"db": "BID",
"id": "108923"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005812"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"id": "VAR-201906-1029",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "VULHUB",
"id": "VHN-142595"
}
],
"trust": 1.44565702
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
}
]
},
"last_update_date": "2024-07-23T22:28:26.009000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 8.4,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05"
},
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for Advantech WebAccess/SCADA arbitrary code execution vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/181487"
},
{
"title": "Advantech WebAccess/SCADA Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=94180"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-598"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-615"
},
{
"db": "ZDI",
"id": "ZDI-19-608"
},
{
"db": "ZDI",
"id": "ZDI-19-618"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005812"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-119",
"trust": 1.0
},
{
"problemtype": "CWE-476",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-142595"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005812"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 11.2,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05"
},
{
"trust": 2.3,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-623/"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-10993"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-597/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-598/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-601/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-602/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-603/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-605/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-606/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-607/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-611/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-612/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-613/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-614/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-615/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-616/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-617/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-618/"
},
{
"trust": 0.9,
"url": "http://webaccess.advantech.com"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10993"
},
{
"trust": 0.6,
"url": "https://www.securityfocus.com/bid/108923"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.2350/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-593/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-595/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-596/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-599/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-600/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-604/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-608/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-609/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-610/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-598"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-615"
},
{
"db": "ZDI",
"id": "ZDI-19-608"
},
{
"db": "ZDI",
"id": "ZDI-19-618"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "VULHUB",
"id": "VHN-142595"
},
{
"db": "BID",
"id": "108923"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005812"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-599",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-613",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-610",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-616",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-606",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-595",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-598",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-605",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-596",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-615",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-608",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-618",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2019-32473",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-142595",
"ident": null
},
{
"db": "BID",
"id": "108923",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005812",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2019-10993",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-599",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-613",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-610",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-616",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-606",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-595",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-598",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-605",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-596",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-615",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-608",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-618",
"ident": null
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32473",
"ident": null
},
{
"date": "2019-06-28T00:00:00",
"db": "VULHUB",
"id": "VHN-142595",
"ident": null
},
{
"date": "2019-06-27T00:00:00",
"db": "BID",
"id": "108923",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005812",
"ident": null
},
{
"date": "2019-06-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-1077",
"ident": null
},
{
"date": "2019-06-28T21:15:11.353000",
"db": "NVD",
"id": "CVE-2019-10993",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-599",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-613",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-610",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-616",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-606",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-595",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-598",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-605",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-596",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-615",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-608",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-618",
"ident": null
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32473",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "VULHUB",
"id": "VHN-142595",
"ident": null
},
{
"date": "2019-06-27T00:00:00",
"db": "BID",
"id": "108923",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005812",
"ident": null
},
{
"date": "2022-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-1077",
"ident": null
},
{
"date": "2022-04-18T17:17:47.753000",
"db": "NVD",
"id": "CVE-2019-10993",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Advantech WebAccess/SCADA Arbitrary code execution vulnerability",
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
}
],
"trust": 0.6
}
}
VAR-202005-0008
Vulnerability from variot - Updated: 2024-07-23 22:25Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791d in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "webaccess/scada",
"scope": null,
"trust": 9.1,
"vendor": "advantech",
"version": null
},
{
"_id": null,
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.4"
},
{
"_id": null,
"model": "webaccess",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.0"
},
{
"_id": null,
"model": "webaccess node",
"scope": "gte",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.4"
},
{
"_id": null,
"model": "webaccess node",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.0"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "9.0.0"
}
],
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-620"
},
{
"db": "ZDI",
"id": "ZDI-20-601"
},
{
"db": "ZDI",
"id": "ZDI-20-600"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-621"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-623"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:9.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"credits": {
"_id": null,
"data": "Z0mb1E",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-620"
},
{
"db": "ZDI",
"id": "ZDI-20-601"
},
{
"db": "ZDI",
"id": "ZDI-20-600"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-621"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-623"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
}
],
"trust": 9.1
},
"cve": "CVE-2020-10638",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-29739",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-10638",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-10638",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 8.4,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2020-10638",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-10638",
"trust": 8.4,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2020-10638",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "ZDI",
"id": "CVE-2020-10638",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2020-29739",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202005-295",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-10638",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-620"
},
{
"db": "ZDI",
"id": "ZDI-20-601"
},
{
"db": "ZDI",
"id": "ZDI-20-600"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-621"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-623"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "VULMON",
"id": "CVE-2020-10638"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
},
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"description": {
"_id": null,
"data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791d in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-10638"
},
{
"db": "ZDI",
"id": "ZDI-20-601"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "ZDI",
"id": "ZDI-20-623"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-621"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-600"
},
{
"db": "ZDI",
"id": "ZDI-20-620"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "VULMON",
"id": "CVE-2020-10638"
}
],
"trust": 10.08
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-10638",
"trust": 11.8
},
{
"db": "ZDI",
"id": "ZDI-20-593",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-20-599",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-20-603",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-20-600",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-20-621",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-20-616",
"trust": 2.4
},
{
"db": "ICS CERT",
"id": "ICSA-20-128-01",
"trust": 2.3
},
{
"db": "CNVD",
"id": "CNVD-2020-29739",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295",
"trust": 1.0
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9902",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9985",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-597",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9994",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9892",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-631",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9897",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10081",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-620",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9998",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-601",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9997",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9890",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-617",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10085",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9891",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-618",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10337",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-623",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9889",
"trust": 0.7
},
{
"db": "NSFOCUS",
"id": "47382",
"trust": 0.6
},
{
"db": "ZDI",
"id": "ZDI-20-635",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.1646",
"trust": 0.6
},
{
"db": "IVD",
"id": "95F15ED9-ABD1-4FA7-B3B8-CCE038C93754",
"trust": 0.2
},
{
"db": "IVD",
"id": "619B16C7-A995-4CDF-B7BE-D91E2BDC75EC",
"trust": 0.2
},
{
"db": "VULMON",
"id": "CVE-2020-10638",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-620"
},
{
"db": "ZDI",
"id": "ZDI-20-601"
},
{
"db": "ZDI",
"id": "ZDI-20-600"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-621"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-623"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "VULMON",
"id": "CVE-2020-10638"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
},
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"id": "VAR-202005-0008",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
}
],
"trust": 1.5788251133333333
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
}
]
},
"last_update_date": "2024-07-23T22:25:28.455000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 9.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"title": "Patch for Advantech WebAccess Node buffer overflow vulnerability (CNVD-2020-29739)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/218845"
},
{
"title": "Advantech WebAccess Node Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=118647"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-620"
},
{
"db": "ZDI",
"id": "ZDI-20-601"
},
{
"db": "ZDI",
"id": "ZDI-20-600"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-621"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-623"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 9.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"trust": 2.9,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-593/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-599/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-600/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-603/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-616/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-621/"
},
{
"trust": 0.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-635/"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-10638"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47382"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.1646/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181596"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-620"
},
{
"db": "ZDI",
"id": "ZDI-20-601"
},
{
"db": "ZDI",
"id": "ZDI-20-600"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-621"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-623"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "VULMON",
"id": "CVE-2020-10638"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
},
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
"ident": null
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-593",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-597",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-599",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-631",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-603",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-620",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-601",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-600",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-617",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-621",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-618",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-623",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-616",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2020-29739",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2020-10638",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-10638",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
"ident": null
},
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-593",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-597",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-599",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-631",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-603",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-620",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-601",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-600",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-617",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-621",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-618",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-623",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-616",
"ident": null
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29739",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "VULMON",
"id": "CVE-2020-10638",
"ident": null
},
{
"date": "2020-05-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-295",
"ident": null
},
{
"date": "2020-05-08T12:15:11.067000",
"db": "NVD",
"id": "CVE-2020-10638",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-593",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-597",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-599",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-631",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-603",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-620",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-601",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-600",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-617",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-621",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-618",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-623",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-616",
"ident": null
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29739",
"ident": null
},
{
"date": "2020-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2020-10638",
"ident": null
},
{
"date": "2021-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-295",
"ident": null
},
{
"date": "2021-12-17T16:57:07.227000",
"db": "NVD",
"id": "CVE-2020-10638",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Advantech WebAccess/SCADA BwTCPIP Heap-based Buffer Overflow Remote Code Execution Vulnerability",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-620"
},
{
"db": "ZDI",
"id": "ZDI-20-621"
}
],
"trust": 1.4
},
"type": {
"_id": null,
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
}
],
"trust": 1.0
}
}
VAR-201904-0181
Vulnerability from variot - Updated: 2024-07-23 22:21Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwmakdir.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201904-0181",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": null,
"trust": 10.5,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=8.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-327"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.3.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mat Powell of Trend Micro Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-327"
}
],
"trust": 10.5
},
"cve": "CVE-2019-6550",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-08948",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157985",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6550",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 10.5,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2019-6550",
"trust": 10.5,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2019-6550",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-08948",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201904-089",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-157985",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-327"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "VULHUB",
"id": "VHN-157985"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwmakdir.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6550"
},
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-327"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "VULHUB",
"id": "VHN-157985"
}
],
"trust": 11.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6550",
"trust": 13.0
},
{
"db": "ZDI",
"id": "ZDI-19-585",
"trust": 2.4
},
{
"db": "ICS CERT",
"id": "ICSA-19-092-01",
"trust": 2.3
},
{
"db": "ZDI",
"id": "ZDI-19-330",
"trust": 1.3
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-08948",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7914",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-322",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7899",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-311",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7924",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-329",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7927",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-325",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7901",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-313",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7905",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-317",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7882",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-328",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7913",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-320",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7910",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-318",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7884",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-308",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7930",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7903",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-315",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7911",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7925",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-323",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7881",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-327",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.1113",
"trust": 0.6
},
{
"db": "BID",
"id": "107675",
"trust": 0.6
},
{
"db": "IVD",
"id": "4D85A7A9-A091-4C59-84E6-73C8B6639498",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157985",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-327"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "VULHUB",
"id": "VHN-157985"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"id": "VAR-201904-0181",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "VULHUB",
"id": "VHN-157985"
}
],
"trust": 1.44565702
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
}
]
},
"last_update_date": "2024-07-23T22:21:36.530000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 4.9,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
},
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 4.9,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-091-01"
},
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-092-01"
},
{
"title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/157945"
},
{
"title": "Advantech WebAccess/SCADA Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91013"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-327"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-119",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157985"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 7.2,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
},
{
"trust": 4.9,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-091-01"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-585/"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/107675"
},
{
"trust": 0.7,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-092-01"
},
{
"trust": 0.6,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.6,
"url": "https://www.advantech.com/"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6550"
},
{
"trust": 0.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-330/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/78318"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-327"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "VULHUB",
"id": "VHN-157985"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-327"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "VULHUB",
"id": "VHN-157985"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-04-03T00:00:00",
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-327"
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"date": "2019-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157985"
},
{
"date": "2019-04-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-089"
},
{
"date": "2019-04-05T19:29:00.310000",
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-317"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-328"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-308"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-330"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-585"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-327"
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"date": "2020-10-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157985"
},
{
"date": "2020-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-089"
},
{
"date": "2020-10-06T14:02:16.967000",
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
}
],
"trust": 0.8
}
}
VAR-202306-0131
Vulnerability from variot - Updated: 2024-03-30 22:29In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment. This vulnerability is caused by the application's lack of effective verification of uploaded files
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202306-0131",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "9.1.3"
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=9.1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15543"
},
{
"db": "NVD",
"id": "CVE-2023-22450"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "9.1.3",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-22450"
}
]
},
"cve": "CVE-2023-22450",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CNVD-2024-15543",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2023-22450",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ics-cert@hq.dhs.gov",
"id": "CVE-2023-22450",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2024-15543",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202306-084",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15543"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-084"
},
{
"db": "NVD",
"id": "CVE-2023-22450"
},
{
"db": "NVD",
"id": "CVE-2023-22450"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "\n\n\nIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment. This vulnerability is caused by the application\u0027s lack of effective verification of uploaded files",
"sources": [
{
"db": "NVD",
"id": "CVE-2023-22450"
},
{
"db": "CNVD",
"id": "CNVD-2024-15543"
},
{
"db": "VULMON",
"id": "CVE-2023-22450"
}
],
"trust": 1.53
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2023-22450",
"trust": 2.3
},
{
"db": "ICS CERT",
"id": "ICSA-23-152-01",
"trust": 1.7
},
{
"db": "AUSCERT",
"id": "ESB-2023.3138",
"trust": 1.2
},
{
"db": "CNVD",
"id": "CNVD-2024-15543",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202306-084",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2023-22450",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15543"
},
{
"db": "VULMON",
"id": "CVE-2023-22450"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-084"
},
{
"db": "NVD",
"id": "CVE-2023-22450"
}
]
},
"id": "VAR-202306-0131",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15543"
}
],
"trust": 1.2586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15543"
}
]
},
"last_update_date": "2024-03-30T22:29:28.734000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Advantech WebAccess/SCADA Arbitrary File Upload Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/537526"
},
{
"title": "Advantech WebAccess/SCADA Fixes for code issue vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=240434"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15543"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-084"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-434",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-22450"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01"
},
{
"trust": 1.2,
"url": "https://www.auscert.org.au/bulletins/esb-2023.3138"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2023-22450/"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-22450"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/434.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15543"
},
{
"db": "VULMON",
"id": "CVE-2023-22450"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-084"
},
{
"db": "NVD",
"id": "CVE-2023-22450"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-15543"
},
{
"db": "VULMON",
"id": "CVE-2023-22450"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-084"
},
{
"db": "NVD",
"id": "CVE-2023-22450"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-03-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-15543"
},
{
"date": "2023-06-06T00:00:00",
"db": "VULMON",
"id": "CVE-2023-22450"
},
{
"date": "2023-06-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202306-084"
},
{
"date": "2023-06-06T00:15:09.310000",
"db": "NVD",
"id": "CVE-2023-22450"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-03-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-15543"
},
{
"date": "2023-06-06T00:00:00",
"db": "VULMON",
"id": "CVE-2023-22450"
},
{
"date": "2023-06-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202306-084"
},
{
"date": "2023-06-12T16:56:27.357000",
"db": "NVD",
"id": "CVE-2023-22450"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-084"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Arbitrary File Upload Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15543"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-084"
}
],
"trust": 0.6
}
}
VAR-202306-0130
Vulnerability from variot - Updated: 2024-03-30 22:29In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202306-0130",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "9.1.3"
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=9.1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15541"
},
{
"db": "NVD",
"id": "CVE-2023-32628"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "9.1.3",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-32628"
}
]
},
"cve": "CVE-2023-32628",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CNVD-2024-15541",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ics-cert@hq.dhs.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2023-32628",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "ics-cert@hq.dhs.gov",
"id": "CVE-2023-32628",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2024-15541",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202306-087",
"trust": 0.6,
"value": "CRITICAL"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15541"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-087"
},
{
"db": "NVD",
"id": "CVE-2023-32628"
},
{
"db": "NVD",
"id": "CVE-2023-32628"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "\n\n\n\n\nIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2023-32628"
},
{
"db": "CNVD",
"id": "CNVD-2024-15541"
},
{
"db": "VULMON",
"id": "CVE-2023-32628"
}
],
"trust": 1.53
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2023-32628",
"trust": 2.3
},
{
"db": "ICS CERT",
"id": "ICSA-23-152-01",
"trust": 1.7
},
{
"db": "AUSCERT",
"id": "ESB-2023.3138",
"trust": 1.2
},
{
"db": "CNVD",
"id": "CNVD-2024-15541",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202306-087",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2023-32628",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15541"
},
{
"db": "VULMON",
"id": "CVE-2023-32628"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-087"
},
{
"db": "NVD",
"id": "CVE-2023-32628"
}
]
},
"id": "VAR-202306-0130",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15541"
}
],
"trust": 1.2586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15541"
}
]
},
"last_update_date": "2024-03-30T22:29:28.784000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Advantech WebAccess/SCADA arbitrary file upload vulnerability (CNVD-2024-15541)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/537536"
},
{
"title": "Advantech WebAccess/SCADA Fixes for code issue vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=241309"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15541"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-087"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-434",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-32628"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01"
},
{
"trust": 1.2,
"url": "https://www.auscert.org.au/bulletins/esb-2023.3138"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2023-32628/"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-32628"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/434.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15541"
},
{
"db": "VULMON",
"id": "CVE-2023-32628"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-087"
},
{
"db": "NVD",
"id": "CVE-2023-32628"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-15541"
},
{
"db": "VULMON",
"id": "CVE-2023-32628"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-087"
},
{
"db": "NVD",
"id": "CVE-2023-32628"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-03-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-15541"
},
{
"date": "2023-06-06T00:00:00",
"db": "VULMON",
"id": "CVE-2023-32628"
},
{
"date": "2023-06-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202306-087"
},
{
"date": "2023-06-06T00:15:10.177000",
"db": "NVD",
"id": "CVE-2023-32628"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-03-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-15541"
},
{
"date": "2023-06-06T00:00:00",
"db": "VULMON",
"id": "CVE-2023-32628"
},
{
"date": "2023-06-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202306-087"
},
{
"date": "2023-06-12T16:53:19.953000",
"db": "NVD",
"id": "CVE-2023-32628"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-087"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA arbitrary file upload vulnerability (CNVD-2024-15541)",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15541"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-087"
}
],
"trust": 0.6
}
}
VAR-202306-0132
Vulnerability from variot - Updated: 2024-03-30 22:29In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202306-0132",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "9.1.3"
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=9.1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15542"
},
{
"db": "NVD",
"id": "CVE-2023-32540"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "9.1.3",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-32540"
}
]
},
"cve": "CVE-2023-32540",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CNVD-2024-15542",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ics-cert@hq.dhs.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2023-32540",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "ics-cert@hq.dhs.gov",
"id": "CVE-2023-32540",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2024-15542",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202306-088",
"trust": 0.6,
"value": "CRITICAL"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15542"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-088"
},
{
"db": "NVD",
"id": "CVE-2023-32540"
},
{
"db": "NVD",
"id": "CVE-2023-32540"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "\nIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2023-32540"
},
{
"db": "CNVD",
"id": "CNVD-2024-15542"
},
{
"db": "VULMON",
"id": "CVE-2023-32540"
}
],
"trust": 1.53
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2023-32540",
"trust": 2.3
},
{
"db": "ICS CERT",
"id": "ICSA-23-152-01",
"trust": 1.7
},
{
"db": "AUSCERT",
"id": "ESB-2023.3138",
"trust": 1.2
},
{
"db": "CNVD",
"id": "CNVD-2024-15542",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202306-088",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2023-32540",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15542"
},
{
"db": "VULMON",
"id": "CVE-2023-32540"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-088"
},
{
"db": "NVD",
"id": "CVE-2023-32540"
}
]
},
"id": "VAR-202306-0132",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15542"
}
],
"trust": 1.2586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15542"
}
]
},
"last_update_date": "2024-03-30T22:29:28.760000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Advantech WebAccess/SCADA Arbitrary File Overwrite Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/537531"
},
{
"title": "Advantech WebAccess/SCADA Fixes for code injection vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=241310"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15542"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-088"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-94",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-32540"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01"
},
{
"trust": 1.2,
"url": "https://www.auscert.org.au/bulletins/esb-2023.3138"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-32540"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2023-32540/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/94.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15542"
},
{
"db": "VULMON",
"id": "CVE-2023-32540"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-088"
},
{
"db": "NVD",
"id": "CVE-2023-32540"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-15542"
},
{
"db": "VULMON",
"id": "CVE-2023-32540"
},
{
"db": "CNNVD",
"id": "CNNVD-202306-088"
},
{
"db": "NVD",
"id": "CVE-2023-32540"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-03-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-15542"
},
{
"date": "2023-06-06T00:00:00",
"db": "VULMON",
"id": "CVE-2023-32540"
},
{
"date": "2023-06-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202306-088"
},
{
"date": "2023-06-06T00:15:10.067000",
"db": "NVD",
"id": "CVE-2023-32540"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-03-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-15542"
},
{
"date": "2023-06-06T00:00:00",
"db": "VULMON",
"id": "CVE-2023-32540"
},
{
"date": "2023-06-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202306-088"
},
{
"date": "2023-06-12T16:55:37.857000",
"db": "NVD",
"id": "CVE-2023-32540"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-088"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Arbitrary File Overwrite Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-15542"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202306-088"
}
],
"trust": 0.6
}
}
VAR-201812-0480
Vulnerability from variot - Updated: 2023-12-18 14:01WebAccess/SCADA, WebAccess/SCADA Version 8.3.2 installed on Windows 2008 R2 SP1. Lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer on the stack. WebAccess/SCADA Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment.
A buffer overflow vulnerability exists in Advantech WebAccess/SCADA version 8.3.2 based on the Windows 2008 R2 SP1 platform that could allow an attacker to execute arbitrary code or cause a denial of service in the context of an affected application. Advantech WebAccess/SCADA is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Failed exploit attempts will likely cause denial-of-service conditions. Advantech WebAccess/SCADA version 8.3.2 is vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201812-0480",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.7,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.6,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "8.3.2"
}
],
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:8.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Jacob Baines of Tenable Network Security",
"sources": [
{
"db": "BID",
"id": "106245"
}
],
"trust": 0.3
},
"cve": "CVE-2018-18999",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2018-18999",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32478",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-129614",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "Low",
"baseScore": 7.3,
"baseSeverity": "High",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2018-18999",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-18999",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2019-32478",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201812-789",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-129614",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA, WebAccess/SCADA Version 8.3.2 installed on Windows 2008 R2 SP1. Lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer on the stack. WebAccess/SCADA Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. \n\nA buffer overflow vulnerability exists in Advantech WebAccess/SCADA version 8.3.2 based on the Windows 2008 R2 SP1 platform that could allow an attacker to execute arbitrary code or cause a denial of service in the context of an affected application. Advantech WebAccess/SCADA is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Failed exploit attempts will likely cause denial-of-service conditions. \nAdvantech WebAccess/SCADA version 8.3.2 is vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-18999"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "VULHUB",
"id": "VHN-129614"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-18999",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-18-352-02",
"trust": 3.4
},
{
"db": "BID",
"id": "106245",
"trust": 2.0
},
{
"db": "TENABLE",
"id": "TRA-2018-45",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32478",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453",
"trust": 0.8
},
{
"db": "IVD",
"id": "7B46AEC3-E0F9-4EAE-BEB8-00887207FB47",
"trust": 0.2
},
{
"db": "SEEBUG",
"id": "SSVID-97745",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-98830",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-129614",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
]
},
"id": "VAR-201812-0480",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
}
],
"trust": 1.5586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
}
]
},
"last_update_date": "2023-12-18T14:01:02.912000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-32478)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/181475"
},
{
"title": "Advantech WebAccess/SCADA Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=87986"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-20",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-352-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/106245"
},
{
"trust": 1.7,
"url": "https://www.tenable.com/security/research/tra-2018-45"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18999"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-18999"
},
{
"trust": 0.3,
"url": "http://www.advantech.in/"
},
{
"trust": 0.3,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"date": "2018-12-19T00:00:00",
"db": "VULHUB",
"id": "VHN-129614"
},
{
"date": "2018-12-18T00:00:00",
"db": "BID",
"id": "106245"
},
{
"date": "2019-02-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"date": "2018-12-19T18:29:00.203000",
"db": "NVD",
"id": "CVE-2018-18999"
},
{
"date": "2018-12-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-11-07T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"date": "2020-09-18T00:00:00",
"db": "VULHUB",
"id": "VHN-129614"
},
{
"date": "2018-12-18T00:00:00",
"db": "BID",
"id": "106245"
},
{
"date": "2019-02-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"date": "2020-09-18T16:53:24.537000",
"db": "NVD",
"id": "CVE-2018-18999"
},
{
"date": "2020-09-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA Input validation vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
],
"trust": 0.6
}
}
VAR-202102-0020
Vulnerability from variot - Updated: 2023-12-18 13:42A local file inclusion vulnerability exists in the installation functionality of Advantech WebAccess/SCADA 9.0.1. A specially crafted application can lead to information disclosure. An attacker can send an authenticated HTTP request to trigger this vulnerability. Advantech WebAccess/SCADA Contains a path traversal vulnerability.Information may be obtained. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. There is a path traversal vulnerability in Advantech WebAccess/SCADA, which originates from the failure of network systems or products to properly filter resources or special elements in file paths. An attacker could exploit this vulnerability to access locations outside of restricted directories
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202102-0020",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11303"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"db": "NVD",
"id": "CVE-2020-13550"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:9.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-13550"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovered by Yuri Kramarz of Cisco Talos.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
],
"trust": 0.6
},
"cve": "CVE-2020-13550",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2020-13550",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 2.7,
"id": "CNVD-2021-11303",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-166340",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.1,
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "talos-cna@cisco.com",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.1,
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.7,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-13550",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "Low",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2020-13550",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "talos-cna@cisco.com",
"id": "CVE-2020-13550",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-11303",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-1262",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-166340",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11303"
},
{
"db": "VULHUB",
"id": "VHN-166340"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"db": "NVD",
"id": "CVE-2020-13550"
},
{
"db": "NVD",
"id": "CVE-2020-13550"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A local file inclusion vulnerability exists in the installation functionality of Advantech WebAccess/SCADA 9.0.1. A specially crafted application can lead to information disclosure. An attacker can send an authenticated HTTP request to trigger this vulnerability. Advantech WebAccess/SCADA Contains a path traversal vulnerability.Information may be obtained. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. There is a path traversal vulnerability in Advantech WebAccess/SCADA, which originates from the failure of network systems or products to properly filter resources or special elements in file paths. An attacker could exploit this vulnerability to access locations outside of restricted directories",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-13550"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"db": "CNVD",
"id": "CNVD-2021-11303"
},
{
"db": "VULHUB",
"id": "VHN-166340"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-13550",
"trust": 3.1
},
{
"db": "TALOS",
"id": "TALOS-2020-1168",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016431",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-11303",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1262",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-166340",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11303"
},
{
"db": "VULHUB",
"id": "VHN-166340"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"db": "NVD",
"id": "CVE-2020-13550"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
]
},
"id": "VAR-202102-0020",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11303"
},
{
"db": "VULHUB",
"id": "VHN-166340"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11303"
}
]
},
"last_update_date": "2023-12-18T13:42:41.377000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Advantech WebAccess/SCADA Repair measures for path traversal vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=142129"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-22",
"trust": 1.1
},
{
"problemtype": "Path traversal (CWE-22) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-166340"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"db": "NVD",
"id": "CVE-2020-13550"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1168"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13550"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11303"
},
{
"db": "VULHUB",
"id": "VHN-166340"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"db": "NVD",
"id": "CVE-2020-13550"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-11303"
},
{
"db": "VULHUB",
"id": "VHN-166340"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"db": "NVD",
"id": "CVE-2020-13550"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11303"
},
{
"date": "2021-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-166340"
},
{
"date": "2021-12-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"date": "2021-02-17T19:15:12.293000",
"db": "NVD",
"id": "CVE-2020-13550"
},
{
"date": "2021-02-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11303"
},
{
"date": "2022-06-29T00:00:00",
"db": "VULHUB",
"id": "VHN-166340"
},
{
"date": "2021-12-03T03:02:00",
"db": "JVNDB",
"id": "JVNDB-2020-016431"
},
{
"date": "2022-06-29T20:30:19.780000",
"db": "NVD",
"id": "CVE-2020-13550"
},
{
"date": "2021-02-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech\u00a0WebAccess/SCADA\u00a0 Traversal Vulnerability in Japan",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016431"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "path traversal",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1262"
}
],
"trust": 0.6
}
}
VAR-201909-0221
Vulnerability from variot - Updated: 2023-12-18 13:02Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated attacker to execute arbitrary code via a crafted IOCTL 70603 RPC message. Advantech WebAccess/SCADA Contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer error vulnerability exists in Advantech WebAccess/SCADA version 8.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201909-0221",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.4,
"vendor": "advantech",
"version": "8.4.1"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "8.4.1"
}
],
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:8.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"cve": "CVE-2019-3975",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-3975",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32466",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-155410",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-3975",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-3975",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-32466",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201909-431",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-155410",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated attacker to execute arbitrary code via a crafted IOCTL 70603 RPC message. Advantech WebAccess/SCADA Contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer error vulnerability exists in Advantech WebAccess/SCADA version 8.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3975"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "VULHUB",
"id": "VHN-155410"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-3975",
"trust": 3.3
},
{
"db": "TENABLE",
"id": "TRA-2019-41",
"trust": 2.5
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32466",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167",
"trust": 0.8
},
{
"db": "IVD",
"id": "6779568D-C80F-445B-BA8E-FA61163D09AD",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-155410",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
]
},
"id": "VAR-201909-0221",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
}
],
"trust": 1.44565702
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
}
]
},
"last_update_date": "2023-12-18T13:02:05.117000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-32466)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/181499"
},
{
"title": "Advantech WebAccess/SCADA Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=98025"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "CWE-120",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.tenable.com/security/research/tra-2019-41"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3975"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3975"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"date": "2019-09-10T00:00:00",
"db": "VULHUB",
"id": "VHN-155410"
},
{
"date": "2019-09-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"date": "2019-09-10T16:15:12.667000",
"db": "NVD",
"id": "CVE-2019-3975"
},
{
"date": "2019-09-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"date": "2019-09-11T00:00:00",
"db": "VULHUB",
"id": "VHN-155410"
},
{
"date": "2019-09-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"date": "2021-07-21T11:39:23.747000",
"db": "NVD",
"id": "CVE-2019-3975"
},
{
"date": "2021-07-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Vulnerable to classic buffer overflow",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
],
"trust": 0.8
}
}
VAR-202102-0294
Vulnerability from variot - Updated: 2023-12-18 12:55The WADashboard component of WebAccess/SCADA Versions 9.0 and prior may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the WADashboard component. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are security vulnerabilities in WebAccess/SCADA WADashboard version 9.0 and earlier versions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202102-0294",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "lt",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "advantech",
"version": "version 9.0"
},
{
"model": "webaccess/scada",
"scope": null,
"trust": 0.7,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=9.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.0.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Sivathmican Sivakumaran",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
}
],
"trust": 0.7
},
"cve": "CVE-2020-25161",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2021-11309",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-179112",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA score",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-009106",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-25161",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2020-25161",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2020-009106",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-25161",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-11309",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202010-700",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-179112",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The WADashboard component of WebAccess/SCADA Versions 9.0 and prior may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the WADashboard component. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are security vulnerabilities in WebAccess/SCADA WADashboard version 9.0 and earlier versions",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-25161"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "VULMON",
"id": "CVE-2020-25161"
}
],
"trust": 2.97
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-25161",
"trust": 3.9
},
{
"db": "ICS CERT",
"id": "ICSA-20-289-01",
"trust": 3.1
},
{
"db": "JVN",
"id": "JVNVU97695305",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11262",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-1261",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-11309",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.3584",
"trust": 0.6
},
{
"db": "SEEBUG",
"id": "SSVID-98405",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-179112",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-25161",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
]
},
"id": "VAR-202102-0294",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11309"
}
]
},
"last_update_date": "2023-12-18T12:55:52.780000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA Release Notes",
"trust": 0.8,
"url": "https://www.advantech.com/support/details/manual?id=1-1j6qg9j"
},
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-289-01"
},
{
"title": "Patch for Advantech WebAccess/SCADA path manipulation code execution vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/248501"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-610",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.8,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-289-01"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-25161"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu97695305"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-25161"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.3584/"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189888"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-10-19T00:00:00",
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"date": "2021-02-23T00:00:00",
"db": "VULHUB",
"id": "VHN-179112"
},
{
"date": "2021-02-23T00:00:00",
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"date": "2020-10-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"date": "2021-02-23T17:15:13.270000",
"db": "NVD",
"id": "CVE-2020-25161"
},
{
"date": "2020-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-10-19T00:00:00",
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"date": "2021-02-27T00:00:00",
"db": "VULHUB",
"id": "VHN-179112"
},
{
"date": "2021-02-27T00:00:00",
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"date": "2020-10-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"date": "2021-02-27T02:26:40.977000",
"db": "NVD",
"id": "CVE-2020-25161"
},
{
"date": "2021-03-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech Made WebAccess/SCADA Filename and pathname external control vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
],
"trust": 0.6
}
}
VAR-201801-1494
Vulnerability from variot - Updated: 2023-12-18 12:37A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. An attacker has read access to files within the directory structure of the target device. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the filename parameter of certUpdate.asp. The issue results from the lack of proper validation of user-supplied data, which can allow for the upload of arbitrary files. An attacker can leverage this vulnerability to execute code under the context of the current process. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA has a directory traversal vulnerability. Advantech WebAccess/SCADA is prone to a directory-traversal vulnerability and a SQL-injection vulnerability A remote attacker could exploit these issues to access data, or exploit latent vulnerabilities in the underlying database or use directory-traversal characters ('../') to access arbitrary files that contain sensitive information. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-1494",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "lt",
"trust": 1.0,
"vendor": "advantech",
"version": "8.2_20170817"
},
{
"model": "webaccess/scada",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "8.2_20170817"
},
{
"model": "webaccess node",
"scope": null,
"trust": 0.7,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess/scada \u003cv8.2 20170817",
"scope": null,
"trust": 0.6,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.0"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "7.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2_20170817",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-142"
}
],
"trust": 0.7
},
"cve": "CVE-2018-5445",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2018-5445",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2018-5445",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-01709",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-135476",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2018-5445",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-5445",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "ZDI",
"id": "CVE-2018-5445",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-01709",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-958",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-135476",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. An attacker has read access to files within the directory structure of the target device. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the filename parameter of certUpdate.asp. The issue results from the lack of proper validation of user-supplied data, which can allow for the upload of arbitrary files. An attacker can leverage this vulnerability to execute code under the context of the current process. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA has a directory traversal vulnerability. Advantech WebAccess/SCADA is prone to a directory-traversal vulnerability and a SQL-injection vulnerability\nA remote attacker could exploit these issues to access data, or exploit latent vulnerabilities in the underlying database or use directory-traversal characters (\u0027../\u0027) to access arbitrary files that contain sensitive information. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-5445"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-135476"
}
],
"trust": 3.33
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-5445",
"trust": 4.3
},
{
"db": "ICS CERT",
"id": "ICSA-18-023-01",
"trust": 3.4
},
{
"db": "BID",
"id": "102781",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-01709",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5492",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-142",
"trust": 0.7
},
{
"db": "IVD",
"id": "E2E2B54F-39AB-11E9-B4D4-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-135476",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
]
},
"id": "VAR-201801-1494",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
}
],
"trust": 1.6679344999999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
}
]
},
"last_update_date": "2023-12-18T12:37:01.671000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-01"
},
{
"title": "Advantech WebAccess/SCADA Directory Traversal Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/114215"
},
{
"title": "Advantech WebAccess/SCADA Repair measures for path traversal vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78082"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-22",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/102781"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5445"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5445"
},
{
"trust": 0.6,
"url": "https://www.proxyit.cc/advisories/icsa-18-023-01"
},
{
"trust": 0.3,
"url": "http://www.advantech.in/"
},
{
"trust": 0.3,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-01-24T00:00:00",
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"date": "2018-01-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"date": "2018-01-25T00:00:00",
"db": "VULHUB",
"id": "VHN-135476"
},
{
"date": "2018-01-23T00:00:00",
"db": "BID",
"id": "102781"
},
{
"date": "2018-02-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"date": "2018-01-25T03:29:00.367000",
"db": "NVD",
"id": "CVE-2018-5445"
},
{
"date": "2018-01-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-02-09T00:00:00",
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"date": "2018-01-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-135476"
},
{
"date": "2018-01-23T00:00:00",
"db": "BID",
"id": "102781"
},
{
"date": "2018-02-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"date": "2019-10-09T23:41:22.423000",
"db": "NVD",
"id": "CVE-2018-5445"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Path traversal vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Path traversal",
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
],
"trust": 0.8
}
}
VAR-201801-1493
Vulnerability from variot - Updated: 2023-12-18 12:37A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. WebAccess/SCADA does not properly sanitize its inputs for SQL commands. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the user parameter in chkLogin2.asp. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the database. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-1493",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess node",
"scope": null,
"trust": 1.4,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess\\/scada",
"scope": "lt",
"trust": 1.0,
"vendor": "advantech",
"version": "8.2_20170817"
},
{
"model": "webaccess/scada",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "8.2_20170817"
},
{
"model": "webaccess/scada \u003cv8.2 20170817",
"scope": null,
"trust": 0.6,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.0"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "7.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2_20170817",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-5443"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
}
],
"trust": 1.4
},
"cve": "CVE-2018-5443",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2018-5443",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 2.2,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-01710",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-135474",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2018-5443",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-5443",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "ZDI",
"id": "CVE-2018-5443",
"trust": 1.4,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2018-01710",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-959",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-135474",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "VULHUB",
"id": "VHN-135474"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. WebAccess/SCADA does not properly sanitize its inputs for SQL commands. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the user parameter in chkLogin2.asp. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the database. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-5443"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-135474"
}
],
"trust": 3.96
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-5443",
"trust": 5.0
},
{
"db": "ICS CERT",
"id": "ICSA-18-023-01",
"trust": 3.4
},
{
"db": "BID",
"id": "102781",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-01710",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5503",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-144",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5502",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-143",
"trust": 0.7
},
{
"db": "IVD",
"id": "E2E2B550-39AB-11E9-BB92-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-135474",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "VULHUB",
"id": "VHN-135474"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
]
},
"id": "VAR-201801-1493",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "VULHUB",
"id": "VHN-135474"
}
],
"trust": 1.6679344999999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
}
]
},
"last_update_date": "2023-12-18T12:37:01.625000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-01"
},
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Patch for Advantech WebAccess/SCADA SQL Injection Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/114217"
},
{
"title": "Advantech WebAccess/SCADA SQL Repair measures for injecting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78083"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-89",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-135474"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 4.2,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/102781"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5443"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5443"
},
{
"trust": 0.6,
"url": "https://www.proxyit.cc/advisories/icsa-18-023-01"
},
{
"trust": 0.3,
"url": "http://www.advantech.in/"
},
{
"trust": 0.3,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "VULHUB",
"id": "VHN-135474"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "VULHUB",
"id": "VHN-135474"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-01-24T00:00:00",
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"date": "2018-01-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"date": "2018-01-25T00:00:00",
"db": "VULHUB",
"id": "VHN-135474"
},
{
"date": "2018-01-23T00:00:00",
"db": "BID",
"id": "102781"
},
{
"date": "2018-02-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"date": "2018-01-25T03:29:00.320000",
"db": "NVD",
"id": "CVE-2018-5443"
},
{
"date": "2018-01-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"date": "2018-01-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-135474"
},
{
"date": "2018-01-23T00:00:00",
"db": "BID",
"id": "102781"
},
{
"date": "2018-02-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"date": "2019-10-09T23:41:22.297000",
"db": "NVD",
"id": "CVE-2018-5443"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA SQL Injection Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SQL injection",
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
],
"trust": 0.8
}
}
VAR-201904-0182
Vulnerability from variot - Updated: 2023-12-18 12:36Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwrunmie.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple command-injection vulnerabilities 2. A denial-of-service vulnerability 3. Multiple stack-based buffer-overflow vulnerabilities An attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions. The vulnerability comes from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201904-0182",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": null,
"trust": 1.4,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 0.8,
"vendor": "advantech",
"version": "8.3.5 and less"
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=8.3.5"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.4"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.3.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6552"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mat Powell of Trend Micro Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
}
],
"trust": 1.4
},
"cve": "CVE-2019-6552",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-6552",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-08949",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157987",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6552",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-6552",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-6552",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "ZDI",
"id": "CVE-2019-6552",
"trust": 1.4,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-08949",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201904-091",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-157987",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2019-6552",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "VULMON",
"id": "CVE-2019-6552"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwrunmie.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple command-injection vulnerabilities\n2. A denial-of-service vulnerability\n3. Multiple stack-based buffer-overflow vulnerabilities\nAn attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions. The vulnerability comes from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6552"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "VULMON",
"id": "CVE-2019-6552"
}
],
"trust": 4.05
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6552",
"trust": 5.1
},
{
"db": "ICS CERT",
"id": "ICSA-19-092-01",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-19-326",
"trust": 1.3
},
{
"db": "BID",
"id": "107675",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-08949",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7928",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7926",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-324",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.1113",
"trust": 0.6
},
{
"db": "IVD",
"id": "7965849B-AD7C-448A-ABFE-D9BB6EA63FFA",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157987",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2019-6552",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "VULMON",
"id": "CVE-2019-6552"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
]
},
"id": "VAR-201904-0182",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "VULHUB",
"id": "VHN-157987"
}
],
"trust": 1.44565702
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
}
]
},
"last_update_date": "2023-12-18T12:36:17.303000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
},
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for Advantech WebAccess/SCADA Command Injection Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/157943"
},
{
"title": "Advantech WebAccess and Advantech WebAccess/SCADA Fixes for command injection vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91015"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-78",
"trust": 1.1
},
{
"problemtype": "CWE-77",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 5.0,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6552"
},
{
"trust": 1.3,
"url": "http://www.securityfocus.com/bid/107675"
},
{
"trust": 0.9,
"url": "https://www.advantech.com/"
},
{
"trust": 0.9,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6552"
},
{
"trust": 0.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-326/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/78318"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/78.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "VULMON",
"id": "CVE-2019-6552"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "VULMON",
"id": "CVE-2019-6552"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-04-03T00:00:00",
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"date": "2019-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157987"
},
{
"date": "2019-04-05T00:00:00",
"db": "VULMON",
"id": "CVE-2019-6552"
},
{
"date": "2019-04-02T00:00:00",
"db": "BID",
"id": "107675"
},
{
"date": "2019-05-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"date": "2019-04-05T19:29:00.357000",
"db": "NVD",
"id": "CVE-2019-6552"
},
{
"date": "2019-04-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"date": "2020-10-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157987"
},
{
"date": "2020-10-06T00:00:00",
"db": "VULMON",
"id": "CVE-2019-6552"
},
{
"date": "2019-04-02T00:00:00",
"db": "BID",
"id": "107675"
},
{
"date": "2019-05-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"date": "2020-10-06T14:03:58.627000",
"db": "NVD",
"id": "CVE-2019-6552"
},
{
"date": "2020-10-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Command injection vulnerability",
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
}
],
"trust": 1.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "operating system commend injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
],
"trust": 0.6
}
}
VAR-201904-0184
Vulnerability from variot - Updated: 2023-12-18 12:36Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may allow an attacker to cause a denial-of-service condition. Advantech WebAccess/SCADA Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within UninstallWA.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple command-injection vulnerabilities 2. A denial-of-service vulnerability 3. Multiple stack-based buffer-overflow vulnerabilities An attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201904-0184",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 0.8,
"vendor": "advantech",
"version": "8.3.5 and less"
},
{
"model": "webaccess",
"scope": null,
"trust": 0.7,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=8.3.5"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.4"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c"
},
{
"db": "ZDI",
"id": "ZDI-19-331"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"db": "NVD",
"id": "CVE-2019-6554"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.3.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6554"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mat Powell of Trend Micro Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-331"
}
],
"trust": 0.7
},
"cve": "CVE-2019-6554",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-6554",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2019-08947",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-157989",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-6554",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6554",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-6554",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "ZDI",
"id": "CVE-2019-6554",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2019-08947",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201904-094",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-157989",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c"
},
{
"db": "ZDI",
"id": "ZDI-19-331"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"db": "VULHUB",
"id": "VHN-157989"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"db": "NVD",
"id": "CVE-2019-6554"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-094"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may allow an attacker to cause a denial-of-service condition. Advantech WebAccess/SCADA Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within UninstallWA.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple command-injection vulnerabilities\n2. A denial-of-service vulnerability\n3. Multiple stack-based buffer-overflow vulnerabilities\nAn attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6554"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"db": "ZDI",
"id": "ZDI-19-331"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c"
},
{
"db": "VULHUB",
"id": "VHN-157989"
}
],
"trust": 3.33
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6554",
"trust": 4.3
},
{
"db": "ICS CERT",
"id": "ICSA-19-092-01",
"trust": 3.4
},
{
"db": "ZDI",
"id": "ZDI-19-331",
"trust": 1.3
},
{
"db": "CNNVD",
"id": "CNNVD-201904-094",
"trust": 0.9
},
{
"db": "BID",
"id": "107675",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-08947",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003119",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7908",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.1113",
"trust": 0.6
},
{
"db": "IVD",
"id": "6A9BB3F5-E6BE-4DC2-9D2B-57459A62BF8C",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157989",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c"
},
{
"db": "ZDI",
"id": "ZDI-19-331"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"db": "VULHUB",
"id": "VHN-157989"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"db": "NVD",
"id": "CVE-2019-6554"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-094"
}
]
},
"id": "VAR-201904-0184",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"db": "VULHUB",
"id": "VHN-157989"
}
],
"trust": 1.44565702
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
}
]
},
"last_update_date": "2023-12-18T12:36:17.353000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
},
{
"title": "Advantech WebAccess/SCADA Patch for Incorrect Access Control Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/157947"
},
{
"title": "Advantech WebAccess and Advantech WebAccess/SCADA Fixes for access control error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91017"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-331"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-094"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-284",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157989"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"db": "NVD",
"id": "CVE-2019-6554"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 4.1,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6554"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/107675"
},
{
"trust": 0.9,
"url": "https://www.advantech.com/"
},
{
"trust": 0.9,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6554"
},
{
"trust": 0.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-331/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/78318"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-331"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"db": "VULHUB",
"id": "VHN-157989"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"db": "NVD",
"id": "CVE-2019-6554"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-094"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c"
},
{
"db": "ZDI",
"id": "ZDI-19-331"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"db": "VULHUB",
"id": "VHN-157989"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"db": "NVD",
"id": "CVE-2019-6554"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-094"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-04-03T00:00:00",
"db": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c"
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-331"
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"date": "2019-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157989"
},
{
"date": "2019-04-02T00:00:00",
"db": "BID",
"id": "107675"
},
{
"date": "2019-05-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"date": "2019-04-05T19:29:00.407000",
"db": "NVD",
"id": "CVE-2019-6554"
},
{
"date": "2019-04-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-094"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-331"
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08947"
},
{
"date": "2020-10-16T00:00:00",
"db": "VULHUB",
"id": "VHN-157989"
},
{
"date": "2019-04-02T00:00:00",
"db": "BID",
"id": "107675"
},
{
"date": "2019-05-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003119"
},
{
"date": "2020-10-16T19:17:35.677000",
"db": "NVD",
"id": "CVE-2019-6554"
},
{
"date": "2020-10-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-094"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-094"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Incorrect access control vulnerability",
"sources": [
{
"db": "IVD",
"id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c"
},
{
"db": "CNVD",
"id": "CNVD-2019-08947"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-094"
}
],
"trust": 0.6
}
}
VAR-202005-0337
Vulnerability from variot - Updated: 2023-12-18 12:35Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized and may allow an attacker to inject SQL commands. Advantech WebAccess Node To SQL An injection vulnerability exists.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00013c71 in BwWebSvc.dll. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is caused by the program not properly sanitizing user input
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202005-0337",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": null,
"trust": 2.1,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess",
"scope": "eq",
"trust": 1.9,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 0.9,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "gte",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "9.0.0"
}
],
"sources": [
{
"db": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e"
},
{
"db": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c"
},
{
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"db": "ZDI",
"id": "ZDI-20-614"
},
{
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"db": "VULMON",
"id": "CVE-2020-12014"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"db": "NVD",
"id": "CVE-2020-12014"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:9.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12014"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Z0mb1E",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"db": "ZDI",
"id": "ZDI-20-614"
}
],
"trust": 2.1
},
"cve": "CVE-2020-12014",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-005144",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-29741",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "dc75839d-760d-4e08-87b4-f1096616019c",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-164650",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-12014",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-12014",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.1,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-005144",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-12014",
"trust": 2.1,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-12014",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2020-005144",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-29741",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202005-299",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-164650",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2020-12014",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e"
},
{
"db": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c"
},
{
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"db": "ZDI",
"id": "ZDI-20-614"
},
{
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"db": "VULHUB",
"id": "VHN-164650"
},
{
"db": "VULMON",
"id": "CVE-2020-12014"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"db": "NVD",
"id": "CVE-2020-12014"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized and may allow an attacker to inject SQL commands. Advantech WebAccess Node To SQL An injection vulnerability exists.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00013c71 in BwWebSvc.dll. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is caused by the program not properly sanitizing user input",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12014"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"db": "ZDI",
"id": "ZDI-20-614"
},
{
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"db": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e"
},
{
"db": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c"
},
{
"db": "VULHUB",
"id": "VHN-164650"
},
{
"db": "VULMON",
"id": "CVE-2020-12014"
}
],
"trust": 4.59
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-12014",
"trust": 5.7
},
{
"db": "ICS CERT",
"id": "ICSA-20-128-01",
"trust": 3.2
},
{
"db": "ZDI",
"id": "ZDI-20-613",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-615",
"trust": 1.4
},
{
"db": "CNVD",
"id": "CNVD-2020-29741",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-202005-299",
"trust": 1.1
},
{
"db": "ZDI",
"id": "ZDI-20-614",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU93292753",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005144",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9884",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9882",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9883",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2020.1646",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "47352",
"trust": 0.6
},
{
"db": "IVD",
"id": "C69F120F-13C6-4366-BC67-15C6B3FA728E",
"trust": 0.2
},
{
"db": "IVD",
"id": "DC75839D-760D-4E08-87B4-F1096616019C",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-164650",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-12014",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e"
},
{
"db": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c"
},
{
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"db": "ZDI",
"id": "ZDI-20-614"
},
{
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"db": "VULHUB",
"id": "VHN-164650"
},
{
"db": "VULMON",
"id": "CVE-2020-12014"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"db": "NVD",
"id": "CVE-2020-12014"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
]
},
"id": "VAR-202005-0337",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e"
},
{
"db": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c"
},
{
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"db": "VULHUB",
"id": "VHN-164650"
}
],
"trust": 1.6788251133333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e"
},
{
"db": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c"
},
{
"db": "CNVD",
"id": "CNVD-2020-29741"
}
]
},
"last_update_date": "2023-12-18T12:35:35.543000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 2.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess Node SQL injection vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/218849"
},
{
"title": "Advantech WebAccess Node SQL Repair measures for injecting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=118218"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"db": "ZDI",
"id": "ZDI-20-614"
},
{
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-89",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-164650"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"db": "NVD",
"id": "CVE-2020-12014"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.8,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01"
},
{
"trust": 2.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-613/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12014"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12014"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93292753/"
},
{
"trust": 0.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-615/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.1646/"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47352"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-614/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/89.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181600"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"db": "ZDI",
"id": "ZDI-20-614"
},
{
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"db": "VULHUB",
"id": "VHN-164650"
},
{
"db": "VULMON",
"id": "CVE-2020-12014"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"db": "NVD",
"id": "CVE-2020-12014"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e"
},
{
"db": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c"
},
{
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"db": "ZDI",
"id": "ZDI-20-614"
},
{
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"db": "VULHUB",
"id": "VHN-164650"
},
{
"db": "VULMON",
"id": "CVE-2020-12014"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"db": "NVD",
"id": "CVE-2020-12014"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e"
},
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-614"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-164650"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12014"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"date": "2020-05-08T12:15:11.253000",
"db": "NVD",
"id": "CVE-2020-12014"
},
{
"date": "2020-05-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-615"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-613"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-614"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"date": "2020-05-11T00:00:00",
"db": "VULHUB",
"id": "VHN-164650"
},
{
"date": "2020-05-11T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12014"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005144"
},
{
"date": "2020-05-11T21:01:03.177000",
"db": "NVD",
"id": "CVE-2020-12014"
},
{
"date": "2020-12-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node SQL injection vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-29741"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SQL injection",
"sources": [
{
"db": "IVD",
"id": "c69f120f-13c6-4366-bc67-15c6b3fa728e"
},
{
"db": "IVD",
"id": "dc75839d-760d-4e08-87b4-f1096616019c"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-299"
}
],
"trust": 1.0
}
}
VAR-202005-0311
Vulnerability from variot - Updated: 2023-12-18 12:35Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An improper validation vulnerability exists that could allow an attacker to inject specially crafted input into memory where it can be executed. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000521e in DATACORE.exe. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202005-0311",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "eq",
"trust": 1.9,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 0.9,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess/scada",
"scope": null,
"trust": 0.7,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess node",
"scope": "gte",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "9.0.0"
}
],
"sources": [
{
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"db": "ZDI",
"id": "ZDI-20-598"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"db": "VULMON",
"id": "CVE-2020-12022"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"db": "NVD",
"id": "CVE-2020-12022"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:9.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12022"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Z0mb1E",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-598"
}
],
"trust": 0.7
},
"cve": "CVE-2020-12022",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-005146",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-27432",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "19380447-9612-4180-8a2e-efbd7ba08404",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-164659",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-12022",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-005146",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-12022",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2020-12022",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "JVNDB-2020-005146",
"trust": 0.8,
"value": "Critical"
},
{
"author": "ZDI",
"id": "CVE-2020-12022",
"trust": 0.7,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2020-27432",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202005-313",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-164659",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-12022",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"db": "ZDI",
"id": "ZDI-20-598"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"db": "VULHUB",
"id": "VHN-164659"
},
{
"db": "VULMON",
"id": "CVE-2020-12022"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"db": "NVD",
"id": "CVE-2020-12022"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An improper validation vulnerability exists that could allow an attacker to inject specially crafted input into memory where it can be executed. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000521e in DATACORE.exe. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12022"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"db": "ZDI",
"id": "ZDI-20-598"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"db": "VULHUB",
"id": "VHN-164659"
},
{
"db": "VULMON",
"id": "CVE-2020-12022"
}
],
"trust": 3.33
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-12022",
"trust": 4.3
},
{
"db": "ICS CERT",
"id": "ICSA-20-128-01",
"trust": 3.2
},
{
"db": "ZDI",
"id": "ZDI-20-598",
"trust": 2.5
},
{
"db": "CNVD",
"id": "CNVD-2020-27432",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-202005-313",
"trust": 1.1
},
{
"db": "JVN",
"id": "JVNVU93292753",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005146",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9988",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2020.1646",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "47693",
"trust": 0.6
},
{
"db": "IVD",
"id": "6265122D-0D35-44B3-85EA-0C5F7B711A0D",
"trust": 0.2
},
{
"db": "IVD",
"id": "19380447-9612-4180-8A2E-EFBD7BA08404",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-164659",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-12022",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"db": "ZDI",
"id": "ZDI-20-598"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"db": "VULHUB",
"id": "VHN-164659"
},
{
"db": "VULMON",
"id": "CVE-2020-12022"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"db": "NVD",
"id": "CVE-2020-12022"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
]
},
"id": "VAR-202005-0311",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"db": "VULHUB",
"id": "VHN-164659"
}
],
"trust": 1.6788251133333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
}
]
},
"last_update_date": "2023-12-18T12:35:35.597000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"title": "Patch for Advantech WebAccess Node input validation error vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/218857"
},
{
"title": "Advantech WebAccess Node Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=118220"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-598"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-129",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-164659"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"db": "NVD",
"id": "CVE-2020-12022"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.2,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-598/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12022"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12022"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93292753/"
},
{
"trust": 0.7,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.1646/"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47693"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/129.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181602"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-598"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"db": "VULHUB",
"id": "VHN-164659"
},
{
"db": "VULMON",
"id": "CVE-2020-12022"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"db": "NVD",
"id": "CVE-2020-12022"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"db": "ZDI",
"id": "ZDI-20-598"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"db": "VULHUB",
"id": "VHN-164659"
},
{
"db": "VULMON",
"id": "CVE-2020-12022"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"db": "NVD",
"id": "CVE-2020-12022"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-598"
},
{
"date": "2020-05-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-164659"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12022"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"date": "2020-05-08T12:15:11.363000",
"db": "NVD",
"id": "CVE-2020-12022"
},
{
"date": "2020-05-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-598"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"date": "2020-05-11T00:00:00",
"db": "VULHUB",
"id": "VHN-164659"
},
{
"date": "2020-05-11T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12022"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005146"
},
{
"date": "2020-05-11T20:47:24.907000",
"db": "NVD",
"id": "CVE-2020-12022"
},
{
"date": "2020-12-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node Input validation error vulnerability",
"sources": [
{
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"db": "CNVD",
"id": "CNVD-2020-27432"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
],
"trust": 1.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation error",
"sources": [
{
"db": "IVD",
"id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d"
},
{
"db": "IVD",
"id": "19380447-9612-4180-8a2e-efbd7ba08404"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-313"
}
],
"trust": 1.0
}
}
VAR-202005-0338
Vulnerability from variot - Updated: 2023-12-18 12:35Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An out-of-bounds vulnerability exists that may allow access to unauthorized data. Advantech WebAccess Node Exists in an out-of-bounds read vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00002722 in ViewSrv.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202005-0338",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "eq",
"trust": 1.9,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": "webaccess/scada",
"scope": null,
"trust": 1.4,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 0.9,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "gte",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "9.0.0"
}
],
"sources": [
{
"db": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38"
},
{
"db": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f"
},
{
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"db": "ZDI",
"id": "ZDI-20-630"
},
{
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"db": "VULMON",
"id": "CVE-2020-12018"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005145"
},
{
"db": "NVD",
"id": "CVE-2020-12018"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:9.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12018"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Z0mb1E",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"db": "ZDI",
"id": "ZDI-20-630"
}
],
"trust": 1.4
},
"cve": "CVE-2020-12018",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-005145",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-29738",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-164654",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-12018",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-12018",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-005145",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-12018",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-12018",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2020-005145",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-29738",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202005-292",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-164654",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2020-12018",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38"
},
{
"db": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f"
},
{
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"db": "ZDI",
"id": "ZDI-20-630"
},
{
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"db": "VULHUB",
"id": "VHN-164654"
},
{
"db": "VULMON",
"id": "CVE-2020-12018"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005145"
},
{
"db": "NVD",
"id": "CVE-2020-12018"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-292"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An out-of-bounds vulnerability exists that may allow access to unauthorized data. Advantech WebAccess Node Exists in an out-of-bounds read vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00002722 in ViewSrv.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12018"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005145"
},
{
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"db": "ZDI",
"id": "ZDI-20-630"
},
{
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"db": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38"
},
{
"db": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f"
},
{
"db": "VULHUB",
"id": "VHN-164654"
},
{
"db": "VULMON",
"id": "CVE-2020-12018"
}
],
"trust": 3.96
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-12018",
"trust": 5.0
},
{
"db": "ICS CERT",
"id": "ICSA-20-128-01",
"trust": 3.2
},
{
"db": "ZDI",
"id": "ZDI-20-628",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-630",
"trust": 1.4
},
{
"db": "CNVD",
"id": "CNVD-2020-29738",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-202005-292",
"trust": 1.1
},
{
"db": "JVN",
"id": "JVNVU93292753",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005145",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9903",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9896",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2020.1646",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "47308",
"trust": 0.6
},
{
"db": "IVD",
"id": "0C0A4C5A-B413-4EB0-98C1-1ACC2309CA38",
"trust": 0.2
},
{
"db": "IVD",
"id": "2CD25065-FDF0-47DB-8723-F8FA644FF39F",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-164654",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-12018",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38"
},
{
"db": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f"
},
{
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"db": "ZDI",
"id": "ZDI-20-630"
},
{
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"db": "VULHUB",
"id": "VHN-164654"
},
{
"db": "VULMON",
"id": "CVE-2020-12018"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005145"
},
{
"db": "NVD",
"id": "CVE-2020-12018"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-292"
}
]
},
"id": "VAR-202005-0338",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38"
},
{
"db": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f"
},
{
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"db": "VULHUB",
"id": "VHN-164654"
}
],
"trust": 1.6788251133333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38"
},
{
"db": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f"
},
{
"db": "CNVD",
"id": "CNVD-2020-29738"
}
]
},
"last_update_date": "2023-12-18T12:35:35.644000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess Node out-of-bounds reading vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/218843"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"db": "ZDI",
"id": "ZDI-20-630"
},
{
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005145"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-125",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-164654"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005145"
},
{
"db": "NVD",
"id": "CVE-2020-12018"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.8,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-628/"
},
{
"trust": 1.4,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12018"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12018"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93292753/"
},
{
"trust": 0.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-630/"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47308"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.1646/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/125.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181601"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"db": "ZDI",
"id": "ZDI-20-630"
},
{
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"db": "VULHUB",
"id": "VHN-164654"
},
{
"db": "VULMON",
"id": "CVE-2020-12018"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005145"
},
{
"db": "NVD",
"id": "CVE-2020-12018"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-292"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38"
},
{
"db": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f"
},
{
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"db": "ZDI",
"id": "ZDI-20-630"
},
{
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"db": "VULHUB",
"id": "VHN-164654"
},
{
"db": "VULMON",
"id": "CVE-2020-12018"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005145"
},
{
"db": "NVD",
"id": "CVE-2020-12018"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-292"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38"
},
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-630"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-164654"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12018"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005145"
},
{
"date": "2020-05-08T12:15:11.317000",
"db": "NVD",
"id": "CVE-2020-12018"
},
{
"date": "2020-05-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-292"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-628"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-630"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29738"
},
{
"date": "2020-05-11T00:00:00",
"db": "VULHUB",
"id": "VHN-164654"
},
{
"date": "2020-05-11T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12018"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005145"
},
{
"date": "2020-05-11T20:52:12.150000",
"db": "NVD",
"id": "CVE-2020-12018"
},
{
"date": "2021-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-292"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-292"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node Out-of-bounds read vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-005145"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38"
},
{
"db": "IVD",
"id": "2cd25065-fdf0-47db-8723-f8fa644ff39f"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-292"
}
],
"trust": 1.0
}
}
VAR-202005-0335
Vulnerability from variot - Updated: 2023-12-18 12:35Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791e in DATACORE.exe. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. Advantech WebAccess Node could allow a remote malicious user to traverse directories on the system, caused by improper validation of user request. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to overwrite arbitrary files on the system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202005-0335",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": null,
"trust": 2.1,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess",
"scope": "eq",
"trust": 1.8,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 0.8,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "gte",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "9.0.0"
}
],
"sources": [
{
"db": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287"
},
{
"db": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f"
},
{
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"db": "ZDI",
"id": "ZDI-20-605"
},
{
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005162"
},
{
"db": "NVD",
"id": "CVE-2020-12006"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:9.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12006"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Z0mb1E",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"db": "ZDI",
"id": "ZDI-20-605"
}
],
"trust": 2.1
},
"cve": "CVE-2020-12006",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-005162",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-29743",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-164641",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-12006",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-12006",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.1,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-005162",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-12006",
"trust": 2.1,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2020-12006",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "JVNDB-2020-005162",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2020-29743",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202005-306",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-164641",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-12006",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287"
},
{
"db": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f"
},
{
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"db": "ZDI",
"id": "ZDI-20-605"
},
{
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"db": "VULHUB",
"id": "VHN-164641"
},
{
"db": "VULMON",
"id": "CVE-2020-12006"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005162"
},
{
"db": "NVD",
"id": "CVE-2020-12006"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-306"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application\u2019s control. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791e in DATACORE.exe. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. Advantech WebAccess Node could allow a remote malicious user to traverse directories on the system, caused by improper validation of user request. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to overwrite arbitrary files on the system",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12006"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005162"
},
{
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"db": "ZDI",
"id": "ZDI-20-605"
},
{
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"db": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287"
},
{
"db": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f"
},
{
"db": "VULHUB",
"id": "VHN-164641"
},
{
"db": "VULMON",
"id": "CVE-2020-12006"
}
],
"trust": 4.59
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-12006",
"trust": 5.7
},
{
"db": "ICS CERT",
"id": "ICSA-20-128-01",
"trust": 3.2
},
{
"db": "ZDI",
"id": "ZDI-20-595",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-589",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-605",
"trust": 2.5
},
{
"db": "CNVD",
"id": "CNVD-2020-29743",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-202005-306",
"trust": 1.1
},
{
"db": "JVN",
"id": "JVNVU93292753",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005162",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9905",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9995",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9901",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2020.1646",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "47349",
"trust": 0.6
},
{
"db": "IVD",
"id": "EC7B8103-B626-4A4F-985F-BD5BDBB95287",
"trust": 0.2
},
{
"db": "IVD",
"id": "2D8FC349-4A01-4FA6-8792-DDCEAE01196F",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-164641",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-12006",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287"
},
{
"db": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f"
},
{
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"db": "ZDI",
"id": "ZDI-20-605"
},
{
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"db": "VULHUB",
"id": "VHN-164641"
},
{
"db": "VULMON",
"id": "CVE-2020-12006"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005162"
},
{
"db": "NVD",
"id": "CVE-2020-12006"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-306"
}
]
},
"id": "VAR-202005-0335",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287"
},
{
"db": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f"
},
{
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"db": "VULHUB",
"id": "VHN-164641"
}
],
"trust": 1.6788251133333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287"
},
{
"db": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f"
},
{
"db": "CNVD",
"id": "CNVD-2020-29743"
}
]
},
"last_update_date": "2023-12-18T12:35:35.425000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 2.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess Node Path Traversal Vulnerability (CNVD-2020-29743)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/218853"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"db": "ZDI",
"id": "ZDI-20-605"
},
{
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005162"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-22",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-164641"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005162"
},
{
"db": "NVD",
"id": "CVE-2020-12006"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.8,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01"
},
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-605/"
},
{
"trust": 2.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-589/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-595/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12006"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12006"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93292753/"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47349"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.1646/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/22.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181598"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"db": "ZDI",
"id": "ZDI-20-605"
},
{
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"db": "VULHUB",
"id": "VHN-164641"
},
{
"db": "VULMON",
"id": "CVE-2020-12006"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005162"
},
{
"db": "NVD",
"id": "CVE-2020-12006"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-306"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287"
},
{
"db": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f"
},
{
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"db": "ZDI",
"id": "ZDI-20-605"
},
{
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"db": "VULHUB",
"id": "VHN-164641"
},
{
"db": "VULMON",
"id": "CVE-2020-12006"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005162"
},
{
"db": "NVD",
"id": "CVE-2020-12006"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-306"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287"
},
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-605"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-164641"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12006"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005162"
},
{
"date": "2020-05-08T12:15:11.160000",
"db": "NVD",
"id": "CVE-2020-12006"
},
{
"date": "2020-05-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-306"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-595"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-589"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-605"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29743"
},
{
"date": "2021-09-23T00:00:00",
"db": "VULHUB",
"id": "VHN-164641"
},
{
"date": "2020-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12006"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005162"
},
{
"date": "2021-09-23T13:42:07.627000",
"db": "NVD",
"id": "CVE-2020-12006"
},
{
"date": "2021-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-306"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-306"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node Past Traversal Vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-005162"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Path traversal",
"sources": [
{
"db": "IVD",
"id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287"
},
{
"db": "IVD",
"id": "2d8fc349-4a01-4fa6-8792-ddceae01196f"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-306"
}
],
"trust": 1.0
}
}
VAR-202005-0312
Vulnerability from variot - Updated: 2023-12-18 12:35Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000277d in ViewSrv.dll. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202005-0312",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "eq",
"trust": 1.8,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": "webaccess/scada",
"scope": null,
"trust": 1.4,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 0.8,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "gte",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "9.0.0"
}
],
"sources": [
{
"db": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062"
},
{
"db": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d"
},
{
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"db": "ZDI",
"id": "ZDI-20-627"
},
{
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"db": "NVD",
"id": "CVE-2020-12026"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:9.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12026"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Z0mb1E",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"db": "ZDI",
"id": "ZDI-20-627"
}
],
"trust": 1.4
},
"cve": "CVE-2020-12026",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-005147",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CNVD-2020-29742",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "f4254815-d8f8-4350-9a94-696eea61a062",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-164663",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULMON",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2020-12026",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-12026",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-005147",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-12026",
"trust": 1.4,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2020-12026",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2020-005147",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-29742",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202005-303",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-164663",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2020-12026",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062"
},
{
"db": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d"
},
{
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"db": "ZDI",
"id": "ZDI-20-627"
},
{
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"db": "VULHUB",
"id": "VHN-164663"
},
{
"db": "VULMON",
"id": "CVE-2020-12026"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"db": "NVD",
"id": "CVE-2020-12026"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-303"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application\u2019s control. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000277d in ViewSrv.dll. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12026"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"db": "ZDI",
"id": "ZDI-20-627"
},
{
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"db": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062"
},
{
"db": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d"
},
{
"db": "VULHUB",
"id": "VHN-164663"
},
{
"db": "VULMON",
"id": "CVE-2020-12026"
}
],
"trust": 3.96
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-12026",
"trust": 5.0
},
{
"db": "ICS CERT",
"id": "ICSA-20-128-01",
"trust": 3.2
},
{
"db": "ZDI",
"id": "ZDI-20-626",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-627",
"trust": 1.4
},
{
"db": "CNVD",
"id": "CNVD-2020-29742",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-202005-303",
"trust": 1.1
},
{
"db": "JVN",
"id": "JVNVU93292753",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005147",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9907",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9899",
"trust": 0.7
},
{
"db": "NSFOCUS",
"id": "47694",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.1646",
"trust": 0.6
},
{
"db": "IVD",
"id": "F4254815-D8F8-4350-9A94-696EEA61A062",
"trust": 0.2
},
{
"db": "IVD",
"id": "7B562860-41D1-412D-8D4E-7ED58E4B7F7D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-164663",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-12026",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062"
},
{
"db": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d"
},
{
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"db": "ZDI",
"id": "ZDI-20-627"
},
{
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"db": "VULHUB",
"id": "VHN-164663"
},
{
"db": "VULMON",
"id": "CVE-2020-12026"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"db": "NVD",
"id": "CVE-2020-12026"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-303"
}
]
},
"id": "VAR-202005-0312",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062"
},
{
"db": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d"
},
{
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"db": "VULHUB",
"id": "VHN-164663"
}
],
"trust": 1.6788251133333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062"
},
{
"db": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d"
},
{
"db": "CNVD",
"id": "CNVD-2020-29742"
}
]
},
"last_update_date": "2023-12-18T12:35:35.009000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess Node Path Traversal Vulnerability (CNVD-2020-29742)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/218851"
},
{
"title": "Advantech WebAccess Node Repair measures for path traversal vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=118654"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"db": "ZDI",
"id": "ZDI-20-627"
},
{
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-303"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-22",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-164663"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"db": "NVD",
"id": "CVE-2020-12026"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.8,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-626/"
},
{
"trust": 1.4,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12026"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12026"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93292753/"
},
{
"trust": 0.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-627/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.1646/"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47694"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/22.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"db": "ZDI",
"id": "ZDI-20-627"
},
{
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"db": "VULHUB",
"id": "VHN-164663"
},
{
"db": "VULMON",
"id": "CVE-2020-12026"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"db": "NVD",
"id": "CVE-2020-12026"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-303"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062"
},
{
"db": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d"
},
{
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"db": "ZDI",
"id": "ZDI-20-627"
},
{
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"db": "VULHUB",
"id": "VHN-164663"
},
{
"db": "VULMON",
"id": "CVE-2020-12026"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"db": "NVD",
"id": "CVE-2020-12026"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-303"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062"
},
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-627"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-164663"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12026"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"date": "2020-05-08T12:15:11.443000",
"db": "NVD",
"id": "CVE-2020-12026"
},
{
"date": "2020-05-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-303"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-626"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-627"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29742"
},
{
"date": "2021-09-23T00:00:00",
"db": "VULHUB",
"id": "VHN-164663"
},
{
"date": "2020-05-11T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12026"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005147"
},
{
"date": "2021-09-23T13:39:06.573000",
"db": "NVD",
"id": "CVE-2020-12026"
},
{
"date": "2021-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-303"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-303"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node Past Traversal Vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-005147"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Path traversal",
"sources": [
{
"db": "IVD",
"id": "f4254815-d8f8-4350-9a94-696eea61a062"
},
{
"db": "IVD",
"id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-303"
}
],
"trust": 1.0
}
}
VAR-202005-0334
Vulnerability from variot - Updated: 2023-12-18 12:35Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. Advantech WebAccess Node Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00005241 in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is due to the fact that the program does not correctly verify the length of the data submitted by the user
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202005-0334",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": null,
"trust": 6.3,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess",
"scope": "eq",
"trust": 1.9,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 0.9,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "gte",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.4"
},
{
"model": "webaccess node",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "9.0.0"
}
],
"sources": [
{
"db": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e"
},
{
"db": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f"
},
{
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"db": "ZDI",
"id": "ZDI-20-633"
},
{
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"db": "VULMON",
"id": "CVE-2020-12002"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"db": "NVD",
"id": "CVE-2020-12002"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:9.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12002"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Z0mb1E",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"db": "ZDI",
"id": "ZDI-20-633"
}
],
"trust": 6.3
},
"cve": "CVE-2020-12002",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-005161",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-29740",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-164637",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-12002",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-12002",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 4.9,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2020-12002",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-005161",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-12002",
"trust": 4.9,
"value": "CRITICAL"
},
{
"author": "ZDI",
"id": "CVE-2020-12002",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-12002",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "JVNDB-2020-005161",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2020-29740",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202005-298",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-164637",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-12002",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e"
},
{
"db": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f"
},
{
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"db": "ZDI",
"id": "ZDI-20-633"
},
{
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"db": "VULHUB",
"id": "VHN-164637"
},
{
"db": "VULMON",
"id": "CVE-2020-12002"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"db": "NVD",
"id": "CVE-2020-12002"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-298"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. Advantech WebAccess Node Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00005241 in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is due to the fact that the program does not correctly verify the length of the data submitted by the user",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-12002"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"db": "ZDI",
"id": "ZDI-20-633"
},
{
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"db": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e"
},
{
"db": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f"
},
{
"db": "VULHUB",
"id": "VHN-164637"
},
{
"db": "VULMON",
"id": "CVE-2020-12002"
}
],
"trust": 8.37
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-12002",
"trust": 9.9
},
{
"db": "ICS CERT",
"id": "ICSA-20-128-01",
"trust": 3.2
},
{
"db": "ZDI",
"id": "ZDI-20-625",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-591",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-634",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-624",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-590",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-592",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-622",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-619",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-633",
"trust": 2.5
},
{
"db": "CNVD",
"id": "CNVD-2020-29740",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-202005-298",
"trust": 1.1
},
{
"db": "JVN",
"id": "JVNVU93292753",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005161",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10339",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9996",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10080",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10338",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9987",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9906",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10086",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10025",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10079",
"trust": 0.7
},
{
"db": "NSFOCUS",
"id": "47354",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.1646",
"trust": 0.6
},
{
"db": "IVD",
"id": "FAFB27EB-2F95-48B4-B412-633E1702E89E",
"trust": 0.2
},
{
"db": "IVD",
"id": "D30FFCD7-838B-4BFA-B622-12761EC4A16F",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-164637",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-12002",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e"
},
{
"db": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f"
},
{
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"db": "ZDI",
"id": "ZDI-20-633"
},
{
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"db": "VULHUB",
"id": "VHN-164637"
},
{
"db": "VULMON",
"id": "CVE-2020-12002"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"db": "NVD",
"id": "CVE-2020-12002"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-298"
}
]
},
"id": "VAR-202005-0334",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e"
},
{
"db": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f"
},
{
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"db": "VULHUB",
"id": "VHN-164637"
}
],
"trust": 1.6788251133333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e"
},
{
"db": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f"
},
{
"db": "CNVD",
"id": "CNVD-2020-29740"
}
]
},
"last_update_date": "2023-12-18T12:35:31.772000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 6.3,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess Node buffer overflow vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/218847"
},
{
"title": "Advantech WebAccess Node Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=118650"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"db": "ZDI",
"id": "ZDI-20-633"
},
{
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-298"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-164637"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"db": "NVD",
"id": "CVE-2020-12002"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 6.3,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"trust": 3.8,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01"
},
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-634/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-590/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-591/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-592/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-619/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-622/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-624/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-625/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-633/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12002"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12002"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93292753/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.1646/"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47354"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181597"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"db": "ZDI",
"id": "ZDI-20-633"
},
{
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"db": "VULHUB",
"id": "VHN-164637"
},
{
"db": "VULMON",
"id": "CVE-2020-12002"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"db": "NVD",
"id": "CVE-2020-12002"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-298"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e"
},
{
"db": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f"
},
{
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"db": "ZDI",
"id": "ZDI-20-633"
},
{
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"db": "VULHUB",
"id": "VHN-164637"
},
{
"db": "VULMON",
"id": "CVE-2020-12002"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"db": "NVD",
"id": "CVE-2020-12002"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-298"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e"
},
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-633"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-164637"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12002"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"date": "2020-05-08T12:15:11.113000",
"db": "NVD",
"id": "CVE-2020-12002"
},
{
"date": "2020-05-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-298"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-625"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-591"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-624"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-590"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-592"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-622"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-619"
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-633"
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29740"
},
{
"date": "2021-09-23T00:00:00",
"db": "VULHUB",
"id": "VHN-164637"
},
{
"date": "2020-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2020-12002"
},
{
"date": "2020-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-005161"
},
{
"date": "2021-09-23T13:42:24.883000",
"db": "NVD",
"id": "CVE-2020-12002"
},
{
"date": "2021-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-298"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-298"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA BwBacNetJ Stack-based Buffer Overflow Remote Code Execution Vulnerability",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-634"
},
{
"db": "ZDI",
"id": "ZDI-20-633"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "fafb27eb-2f95-48b4-b412-633e1702e89e"
},
{
"db": "IVD",
"id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-298"
}
],
"trust": 1.0
}
}
VAR-201902-0123
Vulnerability from variot - Updated: 2023-12-18 12:18WebAccess/SCADA, Version 8.3. Specially crafted requests could allow a possible authentication bypass that could allow an attacker to obtain and manipulate sensitive information. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. An SQL-injection vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201902-0123",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.7,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "8.3"
}
],
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Devesh Logendran from Attila Cybertech Pte. Ltd.",
"sources": [
{
"db": "BID",
"id": "106722"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
],
"trust": 0.9
},
"cve": "CVE-2019-6521",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-6521",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32479",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157956",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 4.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "Low",
"baseScore": 8.6,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-6521",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-6521",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2019-32479",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201901-889",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-157956",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA, Version 8.3. Specially crafted requests could allow a possible authentication bypass that could allow an attacker to obtain and manipulate sensitive information. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple authentication-bypass vulnerabilities\n2. An SQL-injection vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6521"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "VULHUB",
"id": "VHN-157956"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6521",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01",
"trust": 2.8
},
{
"db": "BID",
"id": "106722",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32479",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01T",
"trust": 0.6
},
{
"db": "IVD",
"id": "A390DD39-1C31-478B-BFF6-C1D917A3E87D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157956",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
]
},
"id": "VAR-201902-0123",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
}
],
"trust": 1.5586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
}
]
},
"last_update_date": "2023-12-18T12:18:14.917000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess/SCADA Authorization Issue Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/181477"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/106722"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6521"
},
{
"trust": 0.9,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6521"
},
{
"trust": 0.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01third party advisoryus government resource"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/106722third party advisoryvdb entry"
},
{
"trust": 0.3,
"url": "https://www.advantech.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"date": "2019-02-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157956"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"date": "2019-02-05T21:29:00.800000",
"db": "NVD",
"id": "CVE-2019-6521"
},
{
"date": "2019-01-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"date": "2019-02-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157956"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"date": "2019-02-06T16:45:19.680000",
"db": "NVD",
"id": "CVE-2019-6521"
},
{
"date": "2019-04-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Authorization Issue Vulnerability",
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
],
"trust": 0.6
}
}
VAR-201902-0124
Vulnerability from variot - Updated: 2023-12-18 12:18WebAccess/SCADA, Version 8.3. The software does not properly sanitize its inputs for SQL commands. WebAccess/SCADA Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A SQL injection vulnerability exists in Advantech WebAccess/SCADA version 8.3. A remote attacker can exploit the vulnerability to execute SQL commands by sending a specially crafted request. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. An SQL-injection vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201902-0124",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.7,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "8.3"
}
],
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Devesh Logendran from Attila Cybertech Pte. Ltd.",
"sources": [
{
"db": "BID",
"id": "106722"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
],
"trust": 0.9
},
"cve": "CVE-2019-6523",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-6523",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-03260",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "7d85de81-463f-11e9-a845-000c29342cb1",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157958",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-6523",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-6523",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-03260",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201901-890",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-157958",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2019-6523",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA, Version 8.3. The software does not properly sanitize its inputs for SQL commands. WebAccess/SCADA Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A SQL injection vulnerability exists in Advantech WebAccess/SCADA version 8.3. A remote attacker can exploit the vulnerability to execute SQL commands by sending a specially crafted request. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple authentication-bypass vulnerabilities\n2. An SQL-injection vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6523"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6523",
"trust": 3.7
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01",
"trust": 3.5
},
{
"db": "BID",
"id": "106722",
"trust": 2.1
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-03260",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01T",
"trust": 0.6
},
{
"db": "IVD",
"id": "7D85DE81-463F-11E9-A845-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157958",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2019-6523",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
]
},
"id": "VAR-201902-0124",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
}
],
"trust": 1.5586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
}
]
},
"last_update_date": "2023-12-18T12:18:14.876000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess/SCADA SQL Injection Vulnerability (CNVD-2019-03260)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/151743"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-89",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/106722"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6523"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6523"
},
{
"trust": 0.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01third party advisoryus government resource"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/106722third party advisoryvdb entry"
},
{
"trust": 0.3,
"url": "https://www.advantech.com/"
},
{
"trust": 0.3,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/89.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-01-30T00:00:00",
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"date": "2019-01-28T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"date": "2019-02-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157958"
},
{
"date": "2019-02-05T00:00:00",
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"date": "2019-02-05T21:29:00.863000",
"db": "NVD",
"id": "CVE-2019-6523"
},
{
"date": "2019-01-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-01-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"date": "2019-02-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157958"
},
{
"date": "2019-02-06T00:00:00",
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"date": "2019-02-06T16:43:04.660000",
"db": "NVD",
"id": "CVE-2019-6523"
},
{
"date": "2019-04-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA In SQL Injection vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SQL injection",
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
],
"trust": 0.8
}
}
VAR-201902-0122
Vulnerability from variot - Updated: 2023-12-18 12:18WebAccess/SCADA, Version 8.3. An improper authentication vulnerability exists that could allow a possible authentication bypass allowing an attacker to upload malicious data. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. An SQL-injection vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201902-0122",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.7,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "8.3"
}
],
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Devesh Logendran from Attila Cybertech Pte. Ltd.",
"sources": [
{
"db": "BID",
"id": "106722"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
],
"trust": 0.9
},
"cve": "CVE-2019-6519",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-6519",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32480",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157954",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-6519",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-6519",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-32480",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201901-888",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-157954",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA, Version 8.3. An improper authentication vulnerability exists that could allow a possible authentication bypass allowing an attacker to upload malicious data. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple authentication-bypass vulnerabilities\n2. An SQL-injection vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6519"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "VULHUB",
"id": "VHN-157954"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6519",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01",
"trust": 2.8
},
{
"db": "BID",
"id": "106722",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32480",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01T",
"trust": 0.6
},
{
"db": "IVD",
"id": "3889E774-ABCC-4EE1-BF6B-535A4FBA4CFF",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157954",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
]
},
"id": "VAR-201902-0122",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
}
],
"trust": 1.5586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
}
]
},
"last_update_date": "2023-12-18T12:18:14.954000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess/SCADA Authorization Issue Vulnerability (CNVD-2019-32480)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/181479"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/106722"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6519"
},
{
"trust": 0.9,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6519"
},
{
"trust": 0.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01third party advisoryus government resource"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/106722third party advisoryvdb entry"
},
{
"trust": 0.3,
"url": "https://www.advantech.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"date": "2019-02-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157954"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"date": "2019-02-05T21:29:00.737000",
"db": "NVD",
"id": "CVE-2019-6519"
},
{
"date": "2019-01-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"date": "2019-02-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157954"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"date": "2019-02-06T16:52:08.173000",
"db": "NVD",
"id": "CVE-2019-6519"
},
{
"date": "2019-04-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA Authentication vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
],
"trust": 0.6
}
}
VAR-201906-0330
Vulnerability from variot - Updated: 2023-12-18 12:18Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 81024 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201906-0330",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "eq",
"trust": 1.8,
"vendor": "advantech",
"version": "8.4.0"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "8.4.0"
}
],
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:8.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"cve": "CVE-2019-3954",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-3954",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-18839",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-155389",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-3954",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-3954",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-18839",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201906-724",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-155389",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 81024 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3954"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "VULHUB",
"id": "VHN-155389"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-3954",
"trust": 3.3
},
{
"db": "TENABLE",
"id": "TRA-2019-28",
"trust": 3.1
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-18839",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594",
"trust": 0.8
},
{
"db": "IVD",
"id": "FD36FFFD-9D2A-4D51-AC7D-BAA7412A79AD",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-155389",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
]
},
"id": "VAR-201906-0330",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
}
],
"trust": 1.44565702
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
}
]
},
"last_update_date": "2023-12-18T12:18:05.709000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for AdvantechWebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-18839)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/164439"
},
{
"title": "Advantech WebAccess/SCADA Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93906"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-119",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://www.tenable.com/security/research/tra-2019-28"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3954"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3954"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-21T00:00:00",
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"date": "2019-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"date": "2019-06-19T00:00:00",
"db": "VULHUB",
"id": "VHN-155389"
},
{
"date": "2019-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"date": "2019-06-19T00:15:13.360000",
"db": "NVD",
"id": "CVE-2019-3954"
},
{
"date": "2019-06-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"date": "2020-08-24T00:00:00",
"db": "VULHUB",
"id": "VHN-155389"
},
{
"date": "2019-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"date": "2020-08-24T17:37:01.140000",
"db": "NVD",
"id": "CVE-2019-3954"
},
{
"date": "2020-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
],
"trust": 0.8
}
}
VAR-201906-0329
Vulnerability from variot - Updated: 2023-12-18 12:18Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 10012 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A stack-based buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201906-0329",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "eq",
"trust": 1.8,
"vendor": "advantech",
"version": "8.4.0"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "8.4.0"
}
],
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:8.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"cve": "CVE-2019-3953",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-3953",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-18756",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-155388",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-3953",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-3953",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-18756",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201906-719",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-155388",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 10012 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A stack-based buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3953"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "VULHUB",
"id": "VHN-155388"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-3953",
"trust": 3.3
},
{
"db": "TENABLE",
"id": "TRA-2019-28",
"trust": 2.4
},
{
"db": "TENABLE",
"id": "TRA-2019-17",
"trust": 2.3
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-18756",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593",
"trust": 0.8
},
{
"db": "IVD",
"id": "FA262F58-BB0D-42B5-8FE7-AB4F4FA95260",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-155388",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
]
},
"id": "VAR-201906-0329",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
}
],
"trust": 1.44565702
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
}
]
},
"last_update_date": "2023-12-18T12:18:05.741000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for AdvantechWebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-18756)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/164241"
},
{
"title": "Advantech WebAccess/SCADA Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93903"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-119",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://www.tenable.com/security/research/tra-2019-28"
},
{
"trust": 2.3,
"url": "https://www.tenable.com/security/research/tra-2019-17"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3953"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3953"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-21T00:00:00",
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"date": "2019-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"date": "2019-06-18T00:00:00",
"db": "VULHUB",
"id": "VHN-155388"
},
{
"date": "2019-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"date": "2019-06-18T23:15:10.527000",
"db": "NVD",
"id": "CVE-2019-3953"
},
{
"date": "2019-06-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"date": "2020-08-24T00:00:00",
"db": "VULHUB",
"id": "VHN-155388"
},
{
"date": "2019-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"date": "2020-08-24T17:37:01.140000",
"db": "NVD",
"id": "CVE-2019-3953"
},
{
"date": "2020-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
],
"trust": 0.8
}
}
VAR-202103-0910
Vulnerability from variot - Updated: 2023-12-18 12:16WebAccess/SCADA Versions 9.0 and prior is vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment.
Advantech WebAccess/SCADA 9.0 and earlier versions have cross-site scripting vulnerabilities
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202103-0910",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0"
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=9.0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "9.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"cve": "CVE-2021-27436",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2021-27809",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-386703",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2021-27436",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2021-27436",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2021-27809",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202103-1019",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-386703",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2021-27436",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA Versions 9.0 and prior is vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user\u2019s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. \n\r\n\r\nAdvantech WebAccess/SCADA 9.0 and earlier versions have cross-site scripting vulnerabilities",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-27436"
},
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "ICS CERT",
"id": "ICSA-21-075-01",
"trust": 2.4
},
{
"db": "NVD",
"id": "CVE-2021-27436",
"trust": 2.4
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-27809",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0939",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-386703",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2021-27436",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
]
},
"id": "VAR-202103-0910",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
}
]
},
"last_update_date": "2023-12-18T12:16:30.665000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Advantech WebAccess/SCADA cross-site scripting vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/257466"
},
{
"title": "Advantech Advantech WebAccess/SCADA Fixes for cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=145471"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-075-01"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0939"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-27436"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/79.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-04-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"date": "2021-03-18T00:00:00",
"db": "VULHUB",
"id": "VHN-386703"
},
{
"date": "2021-03-18T00:00:00",
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"date": "2021-03-18T22:15:13.617000",
"db": "NVD",
"id": "CVE-2021-27436"
},
{
"date": "2021-03-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-04-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"date": "2021-03-25T00:00:00",
"db": "VULHUB",
"id": "VHN-386703"
},
{
"date": "2021-03-25T00:00:00",
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"date": "2021-03-25T02:05:21.627000",
"db": "NVD",
"id": "CVE-2021-27436"
},
{
"date": "2021-03-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA cross-site scripting vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
],
"trust": 0.6
}
}
VAR-201904-0334
Vulnerability from variot - Updated: 2023-12-18 12:00Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOCTL 10005 RPC. Advantech WebAccess Contains an access control vulnerability.Information may be tampered with. Advantech WebAccess is a browser-based HMI/SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. An arbitrary file-download vulnerability 2. An arbitrary file-upload vulnerability An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files and perform certain unauthorized actions. This may aid in further attacks. Advantech WebAccess 8.3.4 is vulnerable; other versions may also be affected. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201904-0334",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "eq",
"trust": 2.4,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "8.3.4"
}
],
"sources": [
{
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"db": "NVD",
"id": "CVE-2019-3941"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:8.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3941"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Tenable",
"sources": [
{
"db": "BID",
"id": "107847"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
],
"trust": 0.9
},
"cve": "CVE-2019-3941",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.4,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-3941",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32475",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-155376",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-3941",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-3941",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2019-32475",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201904-479",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-155376",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"db": "VULHUB",
"id": "VHN-155376"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"db": "NVD",
"id": "CVE-2019-3941"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOCTL 10005 RPC. Advantech WebAccess Contains an access control vulnerability.Information may be tampered with. Advantech WebAccess is a browser-based HMI/SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:\n1. An arbitrary file-download vulnerability\n2. An arbitrary file-upload vulnerability\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files and perform certain unauthorized actions. This may aid in further attacks. \nAdvantech WebAccess 8.3.4 is vulnerable; other versions may also be affected. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3941"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"db": "VULHUB",
"id": "VHN-155376"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-3941",
"trust": 3.6
},
{
"db": "TENABLE",
"id": "TRA-2019-15",
"trust": 3.4
},
{
"db": "BID",
"id": "107847",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201904-479",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32475",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003250",
"trust": 0.8
},
{
"db": "IVD",
"id": "977C7FA4-F2FA-4903-84F3-E97660225D1F",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-155376",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"db": "VULHUB",
"id": "VHN-155376"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"db": "NVD",
"id": "CVE-2019-3941"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
]
},
"id": "VAR-201904-0334",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"db": "VULHUB",
"id": "VHN-155376"
}
],
"trust": 1.44565702
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"db": "CNVD",
"id": "CNVD-2019-32475"
}
]
},
"last_update_date": "2023-12-18T12:00:23.192000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Advantech WebAccess Access Control Error Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/181483"
},
{
"title": "Advantech WebAccess Fixes for access control error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91306"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-306",
"trust": 1.1
},
{
"problemtype": "CWE-284",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-155376"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"db": "NVD",
"id": "CVE-2019-3941"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://www.tenable.com/security/research/tra-2019-15"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/107847"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3941"
},
{
"trust": 0.9,
"url": "http://webaccess.advantech.com"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3941"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"db": "VULHUB",
"id": "VHN-155376"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"db": "NVD",
"id": "CVE-2019-3941"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"db": "VULHUB",
"id": "VHN-155376"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"db": "NVD",
"id": "CVE-2019-3941"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"date": "2019-04-09T00:00:00",
"db": "VULHUB",
"id": "VHN-155376"
},
{
"date": "2019-04-03T00:00:00",
"db": "BID",
"id": "107847"
},
{
"date": "2019-05-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"date": "2019-04-09T16:29:02.147000",
"db": "NVD",
"id": "CVE-2019-3941"
},
{
"date": "2019-04-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"date": "2020-08-24T00:00:00",
"db": "VULHUB",
"id": "VHN-155376"
},
{
"date": "2019-04-03T00:00:00",
"db": "BID",
"id": "107847"
},
{
"date": "2019-05-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003250"
},
{
"date": "2020-08-24T17:37:01.140000",
"db": "NVD",
"id": "CVE-2019-3941"
},
{
"date": "2020-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Access Control Error Vulnerability",
"sources": [
{
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"db": "CNVD",
"id": "CNVD-2019-32475"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Access control error",
"sources": [
{
"db": "IVD",
"id": "977c7fa4-f2fa-4903-84f3-e97660225d1f"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-479"
}
],
"trust": 0.8
}
}
VAR-201904-0333
Vulnerability from variot - Updated: 2023-12-18 12:00Advantech WebAccess 8.3.4 is vulnerable to file upload attacks via unauthenticated RPC call. An unauthenticated, remote attacker can use this vulnerability to execute arbitrary code. Advantech WebAccess Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a browser-based HMI/SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. An arbitrary file-download vulnerability 2. This may aid in further attacks. Advantech WebAccess 8.3.4 is vulnerable; other versions may also be affected. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201904-0333",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "eq",
"trust": 2.4,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "8.3.4"
}
],
"sources": [
{
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"db": "NVD",
"id": "CVE-2019-3940"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:advantech:webaccess:8.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3940"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Tenable",
"sources": [
{
"db": "BID",
"id": "107847"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
],
"trust": 0.9
},
"cve": "CVE-2019-3940",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-3940",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32474",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-155375",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-3940",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-3940",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-32474",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201904-485",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-155375",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2019-3940",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"db": "VULHUB",
"id": "VHN-155375"
},
{
"db": "VULMON",
"id": "CVE-2019-3940"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"db": "NVD",
"id": "CVE-2019-3940"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess 8.3.4 is vulnerable to file upload attacks via unauthenticated RPC call. An unauthenticated, remote attacker can use this vulnerability to execute arbitrary code. Advantech WebAccess Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a browser-based HMI/SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:\n1. An arbitrary file-download vulnerability\n2. This may aid in further attacks. \nAdvantech WebAccess 8.3.4 is vulnerable; other versions may also be affected. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3940"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"db": "VULHUB",
"id": "VHN-155375"
},
{
"db": "VULMON",
"id": "CVE-2019-3940"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-3940",
"trust": 3.7
},
{
"db": "TENABLE",
"id": "TRA-2019-15",
"trust": 3.5
},
{
"db": "BID",
"id": "107847",
"trust": 2.1
},
{
"db": "CNNVD",
"id": "CNNVD-201904-485",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32474",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003313",
"trust": 0.8
},
{
"db": "IVD",
"id": "ED3F090D-7F3E-4836-870E-ACC7E4660EF3",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-155375",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2019-3940",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"db": "VULHUB",
"id": "VHN-155375"
},
{
"db": "VULMON",
"id": "CVE-2019-3940"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"db": "NVD",
"id": "CVE-2019-3940"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
]
},
"id": "VAR-201904-0333",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"db": "VULHUB",
"id": "VHN-155375"
}
],
"trust": 1.44565702
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"db": "CNVD",
"id": "CNVD-2019-32474"
}
]
},
"last_update_date": "2023-12-18T12:00:23.112000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for Advantech WebAccess Code Issue Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/181481"
},
{
"title": "Advantech WebAccess Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91310"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-434",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-155375"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"db": "NVD",
"id": "CVE-2019-3940"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.5,
"url": "https://www.tenable.com/security/research/tra-2019-15"
},
{
"trust": 2.4,
"url": "http://www.securityfocus.com/bid/107847"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3940"
},
{
"trust": 0.9,
"url": "http://webaccess.advantech.com"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3940"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/434.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"db": "VULHUB",
"id": "VHN-155375"
},
{
"db": "VULMON",
"id": "CVE-2019-3940"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"db": "NVD",
"id": "CVE-2019-3940"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"db": "VULHUB",
"id": "VHN-155375"
},
{
"db": "VULMON",
"id": "CVE-2019-3940"
},
{
"db": "BID",
"id": "107847"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"db": "NVD",
"id": "CVE-2019-3940"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"date": "2019-04-09T00:00:00",
"db": "VULHUB",
"id": "VHN-155375"
},
{
"date": "2019-04-09T00:00:00",
"db": "VULMON",
"id": "CVE-2019-3940"
},
{
"date": "2019-04-03T00:00:00",
"db": "BID",
"id": "107847"
},
{
"date": "2019-05-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"date": "2019-04-09T16:29:02.100000",
"db": "NVD",
"id": "CVE-2019-3940"
},
{
"date": "2019-04-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32474"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-155375"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULMON",
"id": "CVE-2019-3940"
},
{
"date": "2019-04-03T00:00:00",
"db": "BID",
"id": "107847"
},
{
"date": "2019-05-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003313"
},
{
"date": "2019-10-09T23:49:57.900000",
"db": "NVD",
"id": "CVE-2019-3940"
},
{
"date": "2019-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess Code Issue Vulnerability",
"sources": [
{
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"db": "CNVD",
"id": "CNVD-2019-32474"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Code problem",
"sources": [
{
"db": "IVD",
"id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-485"
}
],
"trust": 0.8
}
}
CVE-2024-2453 (GCVE-0-2024-2453)
Vulnerability from cvelistv5 – Published: 2024-03-21 22:39 – Updated: 2024-08-01 19:11- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.1.5U
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-2453",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-08T15:03:48.290308Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-08T19:52:58.826Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:11:53.526Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"government-resource",
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.1.5U"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "CISA discovered a public proof of concept as authored by Prze\u015blij Komentarz and reported it to Advantech."
}
],
"datePublic": "2024-03-21T21:23:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.\u003c/span\u003e\n\n"
}
],
"value": "\nThere is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-21T22:39:38.185Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdvantech recommends updating WebAccess/SCADA to version 9.1.6 or higher to mitigate this vulnerability.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "\nAdvantech recommends updating WebAccess/SCADA to version 9.1.6 or higher to mitigate this vulnerability.\n\n"
}
],
"source": {
"advisory": "ICSA-24-081-01",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA SQL Injection",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-2453",
"datePublished": "2024-03-21T22:39:15.488Z",
"dateReserved": "2024-03-14T15:12:14.027Z",
"dateUpdated": "2024-08-01T19:11:53.526Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-2453 (GCVE-0-2024-2453)
Vulnerability from nvd – Published: 2024-03-21 22:39 – Updated: 2024-08-01 19:11- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.1.5U
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-2453",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-08T15:03:48.290308Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-08T19:52:58.826Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:11:53.526Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"government-resource",
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.1.5U"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "CISA discovered a public proof of concept as authored by Prze\u015blij Komentarz and reported it to Advantech."
}
],
"datePublic": "2024-03-21T21:23:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.\u003c/span\u003e\n\n"
}
],
"value": "\nThere is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-21T22:39:38.185Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdvantech recommends updating WebAccess/SCADA to version 9.1.6 or higher to mitigate this vulnerability.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "\nAdvantech recommends updating WebAccess/SCADA to version 9.1.6 or higher to mitigate this vulnerability.\n\n"
}
],
"source": {
"advisory": "ICSA-24-081-01",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA SQL Injection",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-2453",
"datePublished": "2024-03-21T22:39:15.488Z",
"dateReserved": "2024-03-14T15:12:14.027Z",
"dateUpdated": "2024-08-01T19:11:53.526Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}