Search criteria

570 vulnerabilities found for WebAccess by Advantech

VAR-201810-0396

Vulnerability from variot - Updated: 2024-07-23 22:37

Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabilities that have been identified, which may allow an attacker to execute arbitrary code. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwclient.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech (Advantech) WebAccess software is the core of Advantech's IoT application platform solution, providing users with a user interface based on HTML5 technology to achieve cross-platform and cross-browser data access experience. A stack buffer overflow vulnerability exists in Advantech WebAccess. Advantech WebAccess is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 3. An arbitrary-file-deletion vulnerability 4. This may aid in further attacks. Advantech WebAccess 8.3.1 and prior versions are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0396",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess node",
        "scope": null,
        "trust": 9.1,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.3.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "8.3.1"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.3.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8"
      },
      {
        "model": "webaccess",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      },
      {
        "db": "BID",
        "id": "105728"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14816"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.3.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-14816"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mat Powell of Trend Micro Zero Day Initiative",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "db": "BID",
        "id": "105728"
      }
    ],
    "trust": 9.4
  },
  "cve": "CVE-2018-14816",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-14816",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 9.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-21935",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-14816",
            "trust": 9.1,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-14816",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-21935",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201810-1188",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14816"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabilities that have been identified, which may allow an attacker to execute arbitrary code. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwclient.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech (Advantech) WebAccess software is the core of Advantech\u0027s IoT application platform solution, providing users with a user interface based on HTML5 technology to achieve cross-platform and cross-browser data access experience. A stack buffer overflow vulnerability exists in Advantech WebAccess. Advantech WebAccess is prone to the following security vulnerabilities:\n1. A directory-traversal vulnerability\n3. An arbitrary-file-deletion vulnerability\n4. This may aid in further attacks. \nAdvantech WebAccess 8.3.1 and prior versions are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-14816"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      },
      {
        "db": "BID",
        "id": "105728"
      },
      {
        "db": "IVD",
        "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1"
      }
    ],
    "trust": 10.08
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-14816",
        "trust": 11.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-296-01",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "105728",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1041939",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1188",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6299",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1311",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6300",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1312",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6296",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1308",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6298",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1310",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6302",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1314",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6295",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1307",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6287",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1300",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6289",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1302",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6285",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1298",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6301",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1313",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6292",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6297",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1309",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6294",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1306",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2FEEFE1-39AB-11E9-8E28-000C29342CB1",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      },
      {
        "db": "BID",
        "id": "105728"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14816"
      }
    ]
  },
  "id": "VAR-201810-0396",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      }
    ],
    "trust": 1.33891657
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:37:44.850000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 9.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-296-01"
      },
      {
        "title": "Patch for Advantech WebAccess Stack Buffer Overflow Vulnerability (CNVD-2018-21935)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/143393"
      },
      {
        "title": "Advantech WebAccess Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=86280"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-14816"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 10.6,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-296-01"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/105728"
      },
      {
        "trust": 1.6,
        "url": "http://www.securitytracker.com/id/1041939"
      },
      {
        "trust": 1.0,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-296-01%2c"
      },
      {
        "trust": 0.3,
        "url": "http://webaccess.advantech.com"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      },
      {
        "db": "BID",
        "id": "105728"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14816"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      },
      {
        "db": "BID",
        "id": "105728"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-14816"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-28T00:00:00",
        "db": "IVD",
        "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "date": "2018-10-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      },
      {
        "date": "2018-10-23T00:00:00",
        "db": "BID",
        "id": "105728"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      },
      {
        "date": "2018-10-23T20:29:00.530000",
        "db": "NVD",
        "id": "CVE-2018-14816"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1311"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1308"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1310"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1314"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1307"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1300"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1302"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1298"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1313"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1304"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1309"
      },
      {
        "date": "2018-10-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1306"
      },
      {
        "date": "2018-10-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21935"
      },
      {
        "date": "2018-10-23T00:00:00",
        "db": "BID",
        "id": "105728"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      },
      {
        "date": "2023-11-07T02:53:02.097000",
        "db": "NVD",
        "id": "CVE-2018-14816"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Client bwwebv Stack-based Buffer Overflow Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1312"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1304"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2feefe1-39ab-11e9-8e28-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1188"
      }
    ],
    "trust": 0.8
  }
}

VAR-201801-0151

Vulnerability from variot - Updated: 2024-07-23 22:28

A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple instances of a vulnerability that allows too much data to be written to a location on the stack. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within the parsing of the command line in the bwprtscr utility. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0151",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": null,
        "trust": 9.1,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 2.4,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-046"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16724"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "8.3",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16724"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Steven Seeley (mr_me) of Offensive Security",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-046"
      }
    ],
    "trust": 9.1
  },
  "cve": "CVE-2017-16724",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2017-16724",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 8.4,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": true,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2017-16724",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2017-16724",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2018-00671",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-16724",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2017-16724",
            "trust": 8.4,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-16724",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "ZDI",
            "id": "CVE-2017-16724",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-00671",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201801-242",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-046"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16724"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple instances of a vulnerability that allows too much data to be written to a location on the stack. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within the parsing of the command line in the bwprtscr utility. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16724"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-046"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      },
      {
        "db": "IVD",
        "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1"
      }
    ],
    "trust": 10.53
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-16724",
        "trust": 12.3
      },
      {
        "db": "BID",
        "id": "102424",
        "trust": 2.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-004-02",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-004-02A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5045",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-044",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5052",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-050",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5054",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-053",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5064",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-061",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4993",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-025",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5043",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-042",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5049",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-048",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5063",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-060",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5053",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-052",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5050",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-049",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5042",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-041",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5051",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-051",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5047",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-046",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2E0E08F-39AB-11E9-B1D1-000C29342CB1",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-046"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16724"
      }
    ]
  },
  "id": "VAR-201801-0151",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      }
    ],
    "trust": 1.23267184
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:28:30.640000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 9.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-004-02"
      },
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.com/industrial-automation/webaccess"
      },
      {
        "title": "Patch for Advantech WebAccess Stack Buffer Overflow Vulnerability (CNVD-2018-00671)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/113123"
      },
      {
        "title": "Advantech WebAccess Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=77553"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-046"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16724"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 10.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-004-02"
      },
      {
        "trust": 2.2,
        "url": "http://www.securityfocus.com/bid/102424"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16724"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-004-02a"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16724"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-046"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16724"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-046"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16724"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-01-10T00:00:00",
        "db": "IVD",
        "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-046"
      },
      {
        "date": "2018-01-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      },
      {
        "date": "2018-01-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "date": "2018-01-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      },
      {
        "date": "2018-01-05T08:29:00.347000",
        "db": "NVD",
        "id": "CVE-2017-16724"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-044"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-050"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-053"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-061"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-025"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-042"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-048"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-060"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-052"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-049"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-041"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-051"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-046"
      },
      {
        "date": "2018-01-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-00671"
      },
      {
        "date": "2018-01-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      },
      {
        "date": "2019-10-09T23:25:14.830000",
        "db": "NVD",
        "id": "CVE-2017-16724"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011795"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0e08f-39ab-11e9-b1d1-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-242"
      }
    ],
    "trust": 0.8
  }
}

VAR-201801-0152

Vulnerability from variot - Updated: 2024-07-23 22:28

An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple vulnerabilities that may allow an attacker to cause the program to use an invalid memory address, resulting in a program crash. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x27eb IOCTL in the webvrpcs process. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A denial of service vulnerability exists in versions prior to Advantech WebAccess 8.3

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0152",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": null,
        "trust": 10.5,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-034"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16728"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "8.3",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16728"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Steven Seeley (mr_me) of Offensive Security",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-034"
      }
    ],
    "trust": 10.5
  },
  "cve": "CVE-2017-16728",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2017-16728",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 9.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": true,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2017-16728",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-00673",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2017-16728",
            "trust": 9.8,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-16728",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "ZDI",
            "id": "CVE-2017-16728",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-00673",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201801-241",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-034"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16728"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple vulnerabilities that may allow an attacker to cause the program to use an invalid memory address, resulting in a program crash. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x27eb IOCTL in the webvrpcs process. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A denial of service vulnerability exists in versions prior to Advantech WebAccess 8.3",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16728"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-034"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      },
      {
        "db": "IVD",
        "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1"
      }
    ],
    "trust": 11.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-16728",
        "trust": 12.9
      },
      {
        "db": "BID",
        "id": "102424",
        "trust": 2.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-004-02",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-241",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5003",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-035",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4959",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-012",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4973",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-020",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5006",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-038",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5007",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-039",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4999",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-031",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5062",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-059",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4965",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-018",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4966",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-019",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4964",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-017",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4961",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-014",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5004",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-036",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4963",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-016",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4997",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-029",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5002",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-034",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2E1079E-39AB-11E9-9B2B-000C29342CB1",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-034"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16728"
      }
    ]
  },
  "id": "VAR-201801-0152",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      }
    ],
    "trust": 1.23267184
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:28:30.754000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 10.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-004-02"
      },
      {
        "title": "Patch for Advantech WebAccess Denial of Service Vulnerability (CNVD-2018-00673)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/113125"
      },
      {
        "title": "Advantech WebAccess Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=77552"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-034"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-476",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16728"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 12.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-004-02"
      },
      {
        "trust": 2.2,
        "url": "http://www.securityfocus.com/bid/102424"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-034"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16728"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-034"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16728"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-01-10T00:00:00",
        "db": "IVD",
        "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-034"
      },
      {
        "date": "2018-01-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      },
      {
        "date": "2018-01-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      },
      {
        "date": "2018-01-05T08:29:00.393000",
        "db": "NVD",
        "id": "CVE-2017-16728"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-035"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-012"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-020"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-038"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-039"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-031"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-059"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-018"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-019"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-017"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-014"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-036"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-016"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-029"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-034"
      },
      {
        "date": "2018-01-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-00673"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      },
      {
        "date": "2019-10-09T23:25:15.270000",
        "db": "NVD",
        "id": "CVE-2017-16728"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess webvrpcs drawsrv SQLSetParam Untrusted Pointer Dereference Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-035"
      }
    ],
    "trust": 0.7
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e1079e-39ab-11e9-9b2b-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-241"
      }
    ],
    "trust": 0.8
  }
}

VAR-201906-1029

Vulnerability from variot - Updated: 2024-07-23 22:28

In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. WebAccess/SCADA Is NULL A vulnerability related to pointer dereference exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. Multiple heap-based buffer-overflow vulnerabilities 4. An information disclosure vulnerability 5. Multiple remote-code execution vulnerabilities An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (â??../â??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. Advantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "webaccess",
        "scope": null,
        "trust": 8.4,
        "vendor": "advantech",
        "version": null
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "8.3.5"
      },
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.3.5"
      },
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3.5"
      },
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3.4"
      },
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3.2"
      },
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.4.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-613"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-610"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-616"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-606"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-595"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-598"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-605"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-596"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-615"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-608"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-618"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473"
      },
      {
        "db": "BID",
        "id": "108923"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005812"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10993"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.3.5",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-10993"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Natnael Samson (@NattiSamson)",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-613"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-610"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-616"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-606"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-595"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-598"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-605"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-596"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-615"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-608"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-618"
      }
    ],
    "trust": 8.4
  },
  "cve": "CVE-2019-10993",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2019-10993",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-32473",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-142595",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-10993",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 8.4,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-10993",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2019-10993",
            "trust": 8.4,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-10993",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-32473",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201906-1077",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-142595",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-613"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-610"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-616"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-606"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-595"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-598"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-605"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-596"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-615"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-608"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-618"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005812"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-1077"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10993"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. WebAccess/SCADA Is NULL A vulnerability related to pointer dereference exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities:\n1. A directory-traversal vulnerability\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. Multiple heap-based buffer-overflow vulnerabilities\n4. An information disclosure vulnerability\n5. Multiple remote-code execution vulnerabilities\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (\u00e2??../\u00e2??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. \nAdvantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-10993"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005812"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-605"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-618"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-608"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-615"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-596"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-598"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-595"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-606"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-616"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-610"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-613"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473"
      },
      {
        "db": "BID",
        "id": "108923"
      },
      {
        "db": "IVD",
        "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142595"
      }
    ],
    "trust": 10.26
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-10993",
        "trust": 12.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-178-05",
        "trust": 2.8
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-613",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-616",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-606",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-598",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-605",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-615",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-618",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-612",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-611",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-602",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-607",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-614",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-597",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-617",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-603",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-601",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-623",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-1077",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "108923",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473",
        "trust": 0.8
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-599",
        "trust": 0.8
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-610",
        "trust": 0.8
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-595",
        "trust": 0.8
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-596",
        "trust": 0.8
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-608",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005812",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8129",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8146",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8143",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8150",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8139",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8118",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8128",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8138",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8126",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8148",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8141",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-8152",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2350",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "D5DCD84F-1ACA-4DC3-AC16-D5C7C3DD4D07",
        "trust": 0.2
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-604",
        "trust": 0.1
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-593",
        "trust": 0.1
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-609",
        "trust": 0.1
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-600",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-142595",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-613"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-610"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-616"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-606"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-595"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-598"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-605"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-596"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-615"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-608"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-618"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142595"
      },
      {
        "db": "BID",
        "id": "108923"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005812"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-1077"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10993"
      }
    ]
  },
  "id": "VAR-201906-1029",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142595"
      }
    ],
    "trust": 1.44565702
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:28:26.009000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 8.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05"
      },
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "https://www.advantech.co.jp/industrial-automation/webaccess"
      },
      {
        "title": "Patch for Advantech WebAccess/SCADA arbitrary code execution vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/181487"
      },
      {
        "title": "Advantech WebAccess/SCADA Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=94180"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-613"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-610"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-616"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-606"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-595"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-598"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-605"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-596"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-615"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-608"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-618"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005812"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-1077"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-476",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-142595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005812"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10993"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 11.2,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05"
      },
      {
        "trust": 2.3,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-623/"
      },
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10993"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-597/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-598/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-601/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-602/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-603/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-605/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-606/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-607/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-611/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-612/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-613/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-614/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-615/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-616/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-617/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-618/"
      },
      {
        "trust": 0.9,
        "url": "http://webaccess.advantech.com"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10993"
      },
      {
        "trust": 0.6,
        "url": "https://www.securityfocus.com/bid/108923"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2350/"
      },
      {
        "trust": 0.1,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-593/"
      },
      {
        "trust": 0.1,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-595/"
      },
      {
        "trust": 0.1,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-596/"
      },
      {
        "trust": 0.1,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-599/"
      },
      {
        "trust": 0.1,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-600/"
      },
      {
        "trust": 0.1,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-604/"
      },
      {
        "trust": 0.1,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-608/"
      },
      {
        "trust": 0.1,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-609/"
      },
      {
        "trust": 0.1,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-610/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-613"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-610"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-616"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-606"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-595"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-598"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-605"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-596"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-615"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-608"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-618"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142595"
      },
      {
        "db": "BID",
        "id": "108923"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005812"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-1077"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10993"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-599",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-613",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-610",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-616",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-606",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-595",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-598",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-605",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-596",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-615",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-608",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-618",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-142595",
        "ident": null
      },
      {
        "db": "BID",
        "id": "108923",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005812",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-1077",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10993",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-09-21T00:00:00",
        "db": "IVD",
        "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-599",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-613",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-610",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-616",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-606",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-595",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-598",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-605",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-596",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-615",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-608",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-618",
        "ident": null
      },
      {
        "date": "2019-09-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-32473",
        "ident": null
      },
      {
        "date": "2019-06-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-142595",
        "ident": null
      },
      {
        "date": "2019-06-27T00:00:00",
        "db": "BID",
        "id": "108923",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-005812",
        "ident": null
      },
      {
        "date": "2019-06-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201906-1077",
        "ident": null
      },
      {
        "date": "2019-06-28T21:15:11.353000",
        "db": "NVD",
        "id": "CVE-2019-10993",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-599",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-613",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-610",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-616",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-606",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-595",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-598",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-605",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-596",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-615",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-608",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-618",
        "ident": null
      },
      {
        "date": "2019-09-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-32473",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-142595",
        "ident": null
      },
      {
        "date": "2019-06-27T00:00:00",
        "db": "BID",
        "id": "108923",
        "ident": null
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-005812",
        "ident": null
      },
      {
        "date": "2022-04-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201906-1077",
        "ident": null
      },
      {
        "date": "2022-04-18T17:17:47.753000",
        "db": "NVD",
        "id": "CVE-2019-10993",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-1077"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Advantech WebAccess/SCADA Arbitrary code execution vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-32473"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-1077"
      }
    ],
    "trust": 0.6
  }
}

VAR-201805-1144

Vulnerability from variot - Updated: 2024-07-23 22:25

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several SQL injection vulnerabilities have been identified, which may allow an attacker to disclose sensitive information from the host. plural Advantech WebAccess The product includes SQL An injection vulnerability exists.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech WebAccess Node. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the handling of the GetAlarms function in BWMobileService.dll. When parsing the ProjectName parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the database. Advantech WebAccess and others are products of Advantech. Advantech WebAccess is a browser-based HMI/SCADA software. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. WebAccess Dashboard is one of the dashboard components; WebAccess Scada Node is one of the monitoring node components. WebAccess/NMS is a suite of web browsers for the Network Management System (NMS). Advantech WebAccess, etc. Advantech WebAccess is a set of HMI/SCADA software based on browser architecture. The following versions are affected: Advantech WebAccess 8.2_20170817 and earlier, 8.3.0 and earlier; WebAccess Dashboard 2.0.15 and earlier; WebAccess Scada Node 8.3.1 and earlier; WebAccess/NMS 2.0.3 and earlier

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201805-1144",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess node",
        "scope": null,
        "trust": 8.4,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "8.2_20170817"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "8.3.0"
      },
      {
        "model": "webaccess dashboard",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "2.0.15"
      },
      {
        "model": "webaccess scada node",
        "scope": "lt",
        "trust": 1.4,
        "vendor": "advantech",
        "version": "8.3.1"
      },
      {
        "model": "webaccess scada",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.3.1"
      },
      {
        "model": "webaccess\\/nms",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "2.0.3"
      },
      {
        "model": "webaccess/nms",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "advantech",
        "version": "2.0.3"
      },
      {
        "model": "webaccess \u003c=8.2 20170817",
        "scope": null,
        "trust": 0.6,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.3.0"
      },
      {
        "model": "webaccess dashboard",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=2.0.15"
      },
      {
        "model": "webaccess/nms",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=2.0.3"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.3.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.2_20170817"
      },
      {
        "model": "webaccess dashboard",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "2.0.15"
      },
      {
        "model": "webaccess\\/nms",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "2.0.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "webaccess",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess dashboard",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess scada",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess nms",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2f022cf-39ab-11e9-a809-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-477"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7501"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.2_20170817",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.3.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess_dashboard:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.0.15",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess_scada:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "8.3.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/nms:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.0.3",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7501"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-477"
      }
    ],
    "trust": 8.4
  },
  "cve": "CVE-2018-7501",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "ZDI",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2018-7501",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 6.3,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2018-7501",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 2.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2018-10317",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "e2f022cf-39ab-11e9-a809-000c29342cb1",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-137533",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2018-7501",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-7501",
            "trust": 8.4,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-7501",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-10317",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201805-445",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2f022cf-39ab-11e9-a809-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137533",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2f022cf-39ab-11e9-a809-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-477"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137533"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7501"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several SQL injection vulnerabilities have been identified, which may allow an attacker to disclose sensitive information from the host. plural Advantech WebAccess The product includes SQL An injection vulnerability exists.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech WebAccess Node. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the handling of the GetAlarms function in BWMobileService.dll.  When parsing the ProjectName parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the database. Advantech WebAccess and others are products of Advantech. Advantech WebAccess is a browser-based HMI/SCADA software. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. WebAccess Dashboard is one of the dashboard components; WebAccess Scada Node is one of the monitoring node components. WebAccess/NMS is a suite of web browsers for the Network Management System (NMS). Advantech WebAccess, etc. Advantech WebAccess is a set of HMI/SCADA software based on browser architecture. The following versions are affected: Advantech WebAccess 8.2_20170817 and earlier, 8.3.0 and earlier; WebAccess Dashboard 2.0.15 and earlier; WebAccess Scada Node 8.3.1 and earlier; WebAccess/NMS 2.0.3 and earlier",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7501"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-477"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "db": "IVD",
        "id": "e2f022cf-39ab-11e9-a809-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137533"
      }
    ],
    "trust": 9.99
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7501",
        "trust": 11.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-135-01",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "104190",
        "trust": 2.3
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-445",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5611",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-481",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5653",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-489",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5649",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-485",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5652",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-488",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5650",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-486",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5597",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-474",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5590",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-553",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5612",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-482",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5519",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-472",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5610",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-480",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5651",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-487",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5607",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-477",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2F022CF-39AB-11E9-A809-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137533",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2f022cf-39ab-11e9-a809-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-477"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137533"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7501"
      }
    ]
  },
  "id": "VAR-201805-1144",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2f022cf-39ab-11e9-a809-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137533"
      }
    ],
    "trust": 1.4944627466666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2f022cf-39ab-11e9-a809-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:25:33.529000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 8.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-135-01"
      },
      {
        "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
        "trust": 0.8,
        "url": "http://www.advantech.co.jp/"
      },
      {
        "title": "Patch for Advantech WebAccess SQL Injection Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/130233"
      },
      {
        "title": "Multiple Advantech product SQL Repair measures for injecting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=80055"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-477"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-89",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137533"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7501"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 11.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-135-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/104190"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7501"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7501"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-477"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137533"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7501"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2f022cf-39ab-11e9-a809-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-477"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137533"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7501"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-05-25T00:00:00",
        "db": "IVD",
        "id": "e2f022cf-39ab-11e9-a809-000c29342cb1"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "date": "2018-06-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-477"
      },
      {
        "date": "2018-05-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "date": "2018-05-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137533"
      },
      {
        "date": "2018-07-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "date": "2018-05-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      },
      {
        "date": "2018-05-15T22:29:00.567000",
        "db": "NVD",
        "id": "CVE-2018-7501"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-481"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-489"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-485"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-488"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-486"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-474"
      },
      {
        "date": "2018-06-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-553"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-482"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-472"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-480"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-487"
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-477"
      },
      {
        "date": "2018-05-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-10317"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137533"
      },
      {
        "date": "2018-07-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      },
      {
        "date": "2019-10-09T23:42:20.113000",
        "db": "NVD",
        "id": "CVE-2018-7501"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Advantech WebAccess In product  SQL Injection vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005073"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SQL injection",
    "sources": [
      {
        "db": "IVD",
        "id": "e2f022cf-39ab-11e9-a809-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-445"
      }
    ],
    "trust": 0.8
  }
}

VAR-201805-1143

Vulnerability from variot - Updated: 2024-07-23 22:25

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several stack-based buffer overflow vulnerabilities have been identified, which may allow an attacker to execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwsound.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator. Advantech WebAccess and others are products of Advantech. Advantech WebAccess is a browser-based HMI/SCADA software. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. WebAccess Dashboard is one of the dashboard components; WebAccess Scada Node is one of the monitoring node components. WebAccess/NMS is a suite of web browsers for the Network Management System (NMS). A stack buffer overflow vulnerability exists in several Advantech products. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple SQL-injection vulnerabilities 2. An information-disclosure vulnerability 3. A file-upload vulnerability 4. Multiple directory-traversal vulnerabilities 5. Multiple stack-based buffer-overflow vulnerabilities 6. A heap-based buffer-overflow vulnerability 7. Multiple arbitrary code-execution vulnerabilities 8. A denial-of-service vulnerability 9. A security-bypass vulnerability 10. A privilege-escalation vulnerability An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database, delete arbitrary files, gain elevated privileges, perform certain unauthorized actions, upload arbitrary files to the affected application gain unauthorized access and obtain sensitive information. Failed attacks will cause denial of service conditions. Advantech WebAccess, etc. Advantech WebAccess is a set of HMI/SCADA software based on browser architecture. The following versions are affected: Advantech WebAccess 8.2_20170817 and earlier, 8.3.0 and earlier; WebAccess Dashboard 2.0.15 and earlier; WebAccess Scada Node 8.3.1 and earlier; WebAccess/NMS 2.0.3 and earlier

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "webaccess node",
        "scope": null,
        "trust": 9.1,
        "vendor": "advantech",
        "version": null
      },
      {
        "_id": null,
        "model": "webaccess dashboard",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "2.0.15"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.3.0"
      },
      {
        "_id": null,
        "model": "webaccess scada",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.3.1"
      },
      {
        "_id": null,
        "model": "webaccess\\/nms",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "2.0.3"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.2_20170817"
      },
      {
        "_id": null,
        "model": "webaccess dashboard",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "2.0.15"
      },
      {
        "_id": null,
        "model": "webaccess \u003c=8.2 20170817",
        "scope": null,
        "trust": 0.6,
        "vendor": "advantech",
        "version": null
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.3.0"
      },
      {
        "_id": null,
        "model": "webaccess dashboard",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=2.0.15"
      },
      {
        "_id": null,
        "model": "webaccess scada node",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.3.1"
      },
      {
        "_id": null,
        "model": "webaccess/nms",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=2.0.3"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.3.0"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.2_20170817"
      },
      {
        "_id": null,
        "model": "webaccess\\/nms",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "2.0.3"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "webaccess",
        "version": "*"
      },
      {
        "_id": null,
        "model": "webaccess/nms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "2.0.3"
      },
      {
        "_id": null,
        "model": "webaccess/nms",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": "webaccess scada node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "_id": null,
        "model": "webaccess dashboard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "_id": null,
        "model": "webaccess 8.2 20170817",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "_id": null,
        "model": "webaccess 8.2 20170330",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.2"
      },
      {
        "_id": null,
        "model": "webaccess 8.1 20160519",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "webaccess 8.0 20150816",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess dashboard",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess scada",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess nms",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-516"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-519"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-523"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-525"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-507"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-497"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-520"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-504"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-510"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-517"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-524"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-490"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713"
      },
      {
        "db": "BID",
        "id": "104190"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-446"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7499"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.2_20170817",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.3.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess_dashboard:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.0.15",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess_scada:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "8.3.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/nms:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.0.3",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7499"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Mat Powell - Trend Micro Zero Day Initiative",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-516"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-519"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-523"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-525"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-507"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-520"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-504"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-510"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-517"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-524"
      }
    ],
    "trust": 7.7
  },
  "cve": "CVE-2018-7499",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7499",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 9.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-10713",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-137531",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-7499",
            "trust": 9.1,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-7499",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-10713",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201805-446",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137531",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-516"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-519"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-523"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-525"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-507"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-497"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-520"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-504"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-510"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-517"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-524"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-490"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137531"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-446"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7499"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several stack-based buffer overflow vulnerabilities have been identified, which may allow an attacker to execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwsound.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator. Advantech WebAccess and others are products of Advantech. Advantech WebAccess is a browser-based HMI/SCADA software. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. WebAccess Dashboard is one of the dashboard components; WebAccess Scada Node is one of the monitoring node components. WebAccess/NMS is a suite of web browsers for the Network Management System (NMS). A stack buffer overflow vulnerability exists in several Advantech products. Advantech WebAccess is prone to the following security vulnerabilities:\n1. Multiple SQL-injection vulnerabilities\n2. An information-disclosure vulnerability\n3. A file-upload vulnerability\n4. Multiple directory-traversal vulnerabilities\n5. Multiple stack-based buffer-overflow vulnerabilities\n6. A heap-based buffer-overflow vulnerability\n7. Multiple arbitrary code-execution vulnerabilities\n8. A denial-of-service vulnerability\n9. A security-bypass vulnerability\n10. A privilege-escalation vulnerability\nAn attacker can exploit these issues to execute arbitrary code in the  context of the application, or modify data, or exploit latent   vulnerabilities in the underlying database,  delete arbitrary files,  gain elevated privileges, perform certain unauthorized actions, upload  arbitrary files to the affected application gain unauthorized access and  obtain sensitive information. Failed attacks will cause denial of  service conditions. Advantech WebAccess, etc. Advantech WebAccess is a set of HMI/SCADA software based on browser architecture. The following versions are affected: Advantech WebAccess 8.2_20170817 and earlier, 8.3.0 and earlier; WebAccess Dashboard 2.0.15 and earlier; WebAccess Scada Node 8.3.1 and earlier; WebAccess/NMS 2.0.3 and earlier",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7499"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-520"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-490"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-524"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-517"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-510"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-516"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-504"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-497"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-507"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-525"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-523"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713"
      },
      {
        "db": "BID",
        "id": "104190"
      },
      {
        "db": "IVD",
        "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137531"
      }
    ],
    "trust": 10.17
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7499",
        "trust": 11.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-135-01",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "104190",
        "trust": 2.0
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-446",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5691",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-516",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5694",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-519",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5698",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-523",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5700",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-525",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5682",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-507",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5662",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-497",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5689",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5695",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-520",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5679",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-504",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5685",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-510",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5692",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-517",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5699",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-524",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5654",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-490",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2F10D30-39AB-11E9-AE57-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137531",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-516"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-519"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-523"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-525"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-507"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-497"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-520"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-504"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-510"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-517"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-524"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-490"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137531"
      },
      {
        "db": "BID",
        "id": "104190"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-446"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7499"
      }
    ]
  },
  "id": "VAR-201805-1143",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137531"
      }
    ],
    "trust": 1.5154899175
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:25:33.635000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 9.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-135-01"
      },
      {
        "title": "Patch for Advantech WebAccess Stack Buffer Overflow Vulnerability (CNVD-2018-10713)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/130743"
      },
      {
        "title": "Multiple Advantech Product Buffer Error Vulnerability Fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=80056"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-516"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-519"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-523"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-525"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-507"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-497"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-520"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-504"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-510"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-517"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-524"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-490"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-446"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137531"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7499"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 11.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-135-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/104190"
      },
      {
        "trust": 0.3,
        "url": "http://webaccess.advantech.com"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-516"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-519"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-523"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-525"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-507"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-497"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-520"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-504"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-510"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-517"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-524"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-490"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137531"
      },
      {
        "db": "BID",
        "id": "104190"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-446"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7499"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-516",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-519",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-523",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-525",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-507",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-497",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-520",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-504",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-510",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-517",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-524",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-490",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-10713",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-137531",
        "ident": null
      },
      {
        "db": "BID",
        "id": "104190",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-446",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7499",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-05-31T00:00:00",
        "db": "IVD",
        "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-516",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-519",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-523",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-525",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-507",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-497",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-514",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-520",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-504",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-510",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-517",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-524",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-490",
        "ident": null
      },
      {
        "date": "2018-05-31T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-10713",
        "ident": null
      },
      {
        "date": "2018-05-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137531",
        "ident": null
      },
      {
        "date": "2018-05-15T00:00:00",
        "db": "BID",
        "id": "104190",
        "ident": null
      },
      {
        "date": "2018-05-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-446",
        "ident": null
      },
      {
        "date": "2018-05-15T22:29:00.503000",
        "db": "NVD",
        "id": "CVE-2018-7499",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-516",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-519",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-523",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-525",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-507",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-497",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-514",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-520",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-504",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-510",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-517",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-524",
        "ident": null
      },
      {
        "date": "2018-05-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-490",
        "ident": null
      },
      {
        "date": "2018-05-31T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-10713",
        "ident": null
      },
      {
        "date": "2020-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137531",
        "ident": null
      },
      {
        "date": "2018-05-15T00:00:00",
        "db": "BID",
        "id": "104190",
        "ident": null
      },
      {
        "date": "2020-10-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-446",
        "ident": null
      },
      {
        "date": "2020-10-02T14:49:19.267000",
        "db": "NVD",
        "id": "CVE-2018-7499",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-446"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Advantech WebAccess Node bwsound Stack-based Buffer Overflow Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-523"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-514"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "_id": null,
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2f10d30-39ab-11e9-ae57-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-446"
      }
    ],
    "trust": 0.8
  }
}

VAR-202005-0008

Vulnerability from variot - Updated: 2024-07-23 22:25

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791d in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "webaccess/scada",
        "scope": null,
        "trust": 9.1,
        "vendor": "advantech",
        "version": null
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.4.4"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "9.0.0"
      },
      {
        "_id": null,
        "model": "webaccess node",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.4.4"
      },
      {
        "_id": null,
        "model": "webaccess node",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "9.0.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "webaccess",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "webaccess",
        "version": "9.0.0"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
      },
      {
        "db": "IVD",
        "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-593"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-597"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-631"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-603"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-620"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-601"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-600"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-617"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-618"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-623"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-616"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10638"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.4.4",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:9.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-10638"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Z0mb1E",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-593"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-597"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-631"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-603"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-620"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-601"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-600"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-617"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-618"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-623"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-616"
      }
    ],
    "trust": 9.1
  },
  "cve": "CVE-2020-10638",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-29739",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2020-10638",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-10638",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 8.4,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "id": "CVE-2020-10638",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2020-10638",
            "trust": 8.4,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2020-10638",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "ZDI",
            "id": "CVE-2020-10638",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-29739",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202005-295",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-10638",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
      },
      {
        "db": "IVD",
        "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-593"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-597"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-631"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-603"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-620"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-601"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-600"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-617"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-618"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-623"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-616"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10638"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-295"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10638"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791d in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-10638"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-601"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-616"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-623"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-618"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-617"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-600"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-620"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-603"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-631"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-597"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-593"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739"
      },
      {
        "db": "IVD",
        "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
      },
      {
        "db": "IVD",
        "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10638"
      }
    ],
    "trust": 10.08
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-10638",
        "trust": 11.8
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-593",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-599",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-603",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-600",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-616",
        "trust": 2.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-20-128-01",
        "trust": 2.3
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-295",
        "trust": 1.0
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9902",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9985",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-597",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9994",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9892",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-631",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9897",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-10081",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-620",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9998",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-601",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9997",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9890",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-617",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-10085",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9891",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-618",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-10337",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-623",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9889",
        "trust": 0.7
      },
      {
        "db": "NSFOCUS",
        "id": "47382",
        "trust": 0.6
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-635",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1646",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "95F15ED9-ABD1-4FA7-B3B8-CCE038C93754",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "619B16C7-A995-4CDF-B7BE-D91E2BDC75EC",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10638",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
      },
      {
        "db": "IVD",
        "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-593"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-597"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-631"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-603"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-620"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-601"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-600"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-617"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-618"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-623"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-616"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10638"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-295"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10638"
      }
    ]
  },
  "id": "VAR-202005-0008",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
      },
      {
        "db": "IVD",
        "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739"
      }
    ],
    "trust": 1.5788251133333333
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
      },
      {
        "db": "IVD",
        "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:25:28.455000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 9.1,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
      },
      {
        "title": "Patch for Advantech WebAccess Node buffer overflow vulnerability (CNVD-2020-29739)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/218845"
      },
      {
        "title": "Advantech WebAccess Node Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=118647"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-593"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-597"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-631"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-603"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-620"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-601"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-600"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-617"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-618"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-623"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-616"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-295"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-10638"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 9.1,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
      },
      {
        "trust": 2.9,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-20-593/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-20-599/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-20-600/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-20-603/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-20-616/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-20-621/"
      },
      {
        "trust": 0.6,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-20-635/"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10638"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/47382"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1646/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181596"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-593"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-597"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-599"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-631"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-603"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-620"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-601"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-600"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-617"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-618"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-623"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-616"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10638"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-295"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10638"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
        "ident": null
      },
      {
        "db": "IVD",
        "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-593",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-597",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-599",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-631",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-603",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-620",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-601",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-600",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-617",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-618",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-623",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-616",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-29739",
        "ident": null
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-10638",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-295",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10638",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2020-05-07T00:00:00",
        "db": "IVD",
        "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
        "ident": null
      },
      {
        "date": "2020-05-07T00:00:00",
        "db": "IVD",
        "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-593",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-597",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-599",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-631",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-603",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-620",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-601",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-600",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-617",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-621",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-618",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-623",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-616",
        "ident": null
      },
      {
        "date": "2020-05-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-29739",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-10638",
        "ident": null
      },
      {
        "date": "2020-05-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202005-295",
        "ident": null
      },
      {
        "date": "2020-05-08T12:15:11.067000",
        "db": "NVD",
        "id": "CVE-2020-10638",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-593",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-597",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-599",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-631",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-603",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-620",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-601",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-600",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-617",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-621",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-618",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-623",
        "ident": null
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-616",
        "ident": null
      },
      {
        "date": "2020-05-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-29739",
        "ident": null
      },
      {
        "date": "2020-05-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-10638",
        "ident": null
      },
      {
        "date": "2021-01-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202005-295",
        "ident": null
      },
      {
        "date": "2021-12-17T16:57:07.227000",
        "db": "NVD",
        "id": "CVE-2020-10638",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-295"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Advantech WebAccess/SCADA BwTCPIP Heap-based Buffer Overflow Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-620"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-621"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "_id": null,
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
      },
      {
        "db": "IVD",
        "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-295"
      }
    ],
    "trust": 1.0
  }
}

VAR-201407-0233

Vulnerability from variot - Updated: 2024-07-23 22:22

Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the webdact.ocx ActiveX Control. The control does not check the length of an attacker-supplied NodeName string before copying it into a fixed length buffer on the stack. This could allow an attacker to execute arbitrary code in the context of the browser process. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess webvact.ocx, dvs.ocx and webdact.ocx ActiveX controls fail to properly handle long-length named ProjectName, SetParameter, NodeName, CCDParameter, SetColor, AlarmImage, GetParameter, GetColor, ServerResponse, SetBaud and IPAddress parameters, and attackers can build malicious A WEB page that entice a user to access, can crash an application or execute arbitrary code. Advantech WebAccess is prone to multiple remote stack-based buffer-overflow vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Advantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "webaccess",
        "scope": null,
        "trust": 7.7,
        "vendor": "advantech",
        "version": null
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "7.0"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "5.0"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "6.0"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "lt",
        "trust": 1.4,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "7.1"
      },
      {
        "_id": null,
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "7.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "5.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "6.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "7.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e485769a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-244"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-252"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-241"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-243"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-242"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-247"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-248"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-476"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2364"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2364"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Anonymous",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-252"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-247"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-248"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-254"
      }
    ],
    "trust": 4.9
  },
  "cve": "CVE-2014-2364",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2014-2364",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 8.5,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-04544",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "e485769a-2351-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-70303",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2014-2364",
            "trust": 7.7,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-2364",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-04544",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201407-476",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e485769a-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-70303",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e485769a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-244"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-252"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-241"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-243"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-242"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-247"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-248"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-476"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2364"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the webdact.ocx ActiveX Control. The control does not check the length of an attacker-supplied NodeName string before copying it into a fixed length buffer on the stack. This could allow an attacker to execute arbitrary code in the context of the browser process. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess webvact.ocx, dvs.ocx and webdact.ocx ActiveX controls fail to properly handle long-length named ProjectName, SetParameter, NodeName, CCDParameter, SetColor, AlarmImage, GetParameter, GetColor, ServerResponse, SetBaud and IPAddress parameters, and attackers can build malicious A WEB page that entice a user to access, can crash an application or execute arbitrary code. Advantech WebAccess is prone to multiple remote stack-based buffer-overflow vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. \nAdvantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2364"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-243"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-254"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-248"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-247"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-242"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-241"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-252"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-244"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544"
      },
      {
        "db": "BID",
        "id": "68714"
      },
      {
        "db": "IVD",
        "id": "e485769a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70303"
      }
    ],
    "trust": 9.81
  },
  "exploit_availability": {
    "_id": null,
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-70303",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70303"
      }
    ]
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-2364",
        "trust": 11.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-198-02",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "68714",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-476",
        "trust": 1.1
      },
      {
        "db": "PACKETSTORM",
        "id": "128384",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2045",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-244",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2062",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-252",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2066",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-255",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2032",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-241",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2065",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-246",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2044",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-243",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2063",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-253",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2043",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-242",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2068",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-247",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2069",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-248",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2064",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-254",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "7D7F00B0-463F-11E9-B5C5-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "E485769A-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "34757",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-70303",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e485769a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-244"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-252"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-241"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-243"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-242"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-247"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-248"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70303"
      },
      {
        "db": "BID",
        "id": "68714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-476"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2364"
      }
    ]
  },
  "id": "VAR-201407-0233",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e485769a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70303"
      }
    ],
    "trust": 1.5326718400000001
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e485769a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:22:21.013000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 7.7,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-198-02"
      },
      {
        "title": "Downloads ::: WebAccess Software",
        "trust": 0.8,
        "url": "http://webaccess.advantech.com/downloads.php?item=software"
      },
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://webaccess.advantech.com/"
      },
      {
        "title": "Advantech WebAccess patch for multiple ActiveX control buffer overflow vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/47828"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-244"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-252"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-241"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-243"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-242"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-247"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-248"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2364"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 10.8,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-198-02"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/68714"
      },
      {
        "trust": 1.1,
        "url": "http://packetstormsecurity.com/files/128384/advantech-webaccess-dvs.ocx-getcolor-buffer-overflow.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2364"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2364"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-244"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-252"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-241"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-246"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-243"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-242"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-247"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-248"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-476"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2364"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1",
        "ident": null
      },
      {
        "db": "IVD",
        "id": "e485769a-2351-11e6-abef-000c29c66e3d",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-244",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-252",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-255",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-241",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-246",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-243",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-253",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-242",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-247",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-248",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-254",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04544",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-70303",
        "ident": null
      },
      {
        "db": "BID",
        "id": "68714",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-476",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2364",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2014-07-24T00:00:00",
        "db": "IVD",
        "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1",
        "ident": null
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "IVD",
        "id": "e485769a-2351-11e6-abef-000c29c66e3d",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-244",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-252",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-255",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-241",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-246",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-243",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-253",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-242",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-247",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-248",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-254",
        "ident": null
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-04544",
        "ident": null
      },
      {
        "date": "2014-07-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70303",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "BID",
        "id": "68714",
        "ident": null
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003487",
        "ident": null
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-476",
        "ident": null
      },
      {
        "date": "2014-07-19T05:09:27.563000",
        "db": "NVD",
        "id": "CVE-2014-2364",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-244",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-252",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-255",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-241",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-246",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-243",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-253",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-242",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-247",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-248",
        "ident": null
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-254",
        "ident": null
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-04544",
        "ident": null
      },
      {
        "date": "2015-08-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70303",
        "ident": null
      },
      {
        "date": "2014-09-25T00:03:00",
        "db": "BID",
        "id": "68714",
        "ident": null
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003487",
        "ident": null
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-476",
        "ident": null
      },
      {
        "date": "2015-08-11T14:38:48.603000",
        "db": "NVD",
        "id": "CVE-2014-2364",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-476"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Advantech WebAccess Vulnerable to stack-based buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003487"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f00b0-463f-11e9-b5c5-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e485769a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-476"
      }
    ],
    "trust": 1.0
  }
}

VAR-201601-0038

Vulnerability from variot - Updated: 2024-07-23 22:22

Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x27B1 IOCTL in the ViewSrv subsystem. A stack-based buffer overflow vulnerability exists in a call to BwBuildPath. An attacker can use this vulnerability to execute arbitrary code in the context of an administrator of the system. WebAccess HMI/SCADA software provides remote control and management, allowing users to easily view and configure automation equipment in facility management systems, power stations and building automation systems

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0038",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": null,
        "trust": 10.5,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.0"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "64dba96e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-073"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-0856"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-0856"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Anonymous",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-073"
      }
    ],
    "trust": 10.5
  },
  "cve": "CVE-2016-0856",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2016-0856",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 10.5,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": true,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-00434",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "64dba96e-2351-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2016-0856",
            "trust": 10.5,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-0856",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-00434",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201601-329",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "64dba96e-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "64dba96e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-073"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-0856"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x27B1 IOCTL in the ViewSrv subsystem. A stack-based buffer overflow vulnerability exists in a call to BwBuildPath. An attacker can use this vulnerability to execute arbitrary code in the context of an administrator of the system. WebAccess HMI/SCADA software provides remote control and management, allowing users to easily view and configure automation equipment in facility management systems, power stations and building automation systems",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-0856"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-073"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      },
      {
        "db": "IVD",
        "id": "64dba96e-2351-11e6-abef-000c29c66e3d"
      }
    ],
    "trust": 11.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-0856",
        "trust": 12.9
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-103",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-113",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-115",
        "trust": 1.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-101",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-109",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-110",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-111",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-112",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-116",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-108",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-114",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-120",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-117",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-106",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-102",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-100",
        "trust": 1.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-118",
        "trust": 1.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-014-01",
        "trust": 1.0
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-329",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3211",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-090",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3239",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-062",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3207",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-094",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3175",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-051",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3198",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3188",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3238",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-063",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3226",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-075",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3246",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-055",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3206",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-095",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3216",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-085",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3185",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3218",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-083",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3208",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3228",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-073",
        "trust": 0.7
      },
      {
        "db": "CXSECURITY",
        "id": "WLB-2018030263",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "64DBA96E-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "64dba96e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-073"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-0856"
      }
    ]
  },
  "id": "VAR-201601-0038",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "64dba96e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      }
    ],
    "trust": 1.23267184
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "64dba96e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:22:04.421000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 10.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-014-01"
      },
      {
        "title": "Patch for Advantech WebAccess Stack Buffer Overflow Vulnerability (CNVD-2016-00434)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/70378"
      },
      {
        "title": "Advantech WebAccess Fixes for stack-based buffer overflow vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=59647"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-073"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-0856"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 11.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-014-01"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-100"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-101"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-102"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-103"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-106"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-108"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-109"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-110"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-111"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-112"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-113"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-114"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-115"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-116"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-117"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-118"
      },
      {
        "trust": 1.0,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-120"
      },
      {
        "trust": 0.6,
        "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0856"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/issue/wlb-2018030263"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-073"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-0856"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "64dba96e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-073"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-0856"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-01-25T00:00:00",
        "db": "IVD",
        "id": "64dba96e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-073"
      },
      {
        "date": "2016-01-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      },
      {
        "date": "2016-01-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      },
      {
        "date": "2016-01-15T03:59:18.250000",
        "db": "NVD",
        "id": "CVE-2016-0856"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-090"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-062"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-051"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-103"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-113"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-063"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-075"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-055"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-095"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-085"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-115"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-083"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-093"
      },
      {
        "date": "2016-02-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-073"
      },
      {
        "date": "2016-01-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-00434"
      },
      {
        "date": "2021-08-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      },
      {
        "date": "2016-12-03T03:18:18.117000",
        "db": "NVD",
        "id": "CVE-2016-0856"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess webvrpcs Service DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-094"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-093"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201601-329"
      }
    ],
    "trust": 0.6
  }
}

VAR-201904-0181

Vulnerability from variot - Updated: 2024-07-23 22:21

Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwmakdir.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0181",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": null,
        "trust": 10.5,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.3.5"
      },
      {
        "model": "webaccess/scada",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.3.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-327"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6550"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.3.5",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-6550"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mat Powell of Trend Micro Zero Day Initiative",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-327"
      }
    ],
    "trust": 10.5
  },
  "cve": "CVE-2019-6550",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-08948",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-157985",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-6550",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 10.5,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2019-6550",
            "trust": 10.5,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-6550",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-08948",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201904-089",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-157985",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-327"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "db": "VULHUB",
        "id": "VHN-157985"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-089"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6550"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwmakdir.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-6550"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-327"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "db": "VULHUB",
        "id": "VHN-157985"
      }
    ],
    "trust": 11.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-6550",
        "trust": 13.0
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-585",
        "trust": 2.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-092-01",
        "trust": 2.3
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-330",
        "trust": 1.3
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-089",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7914",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-322",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7899",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-311",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7924",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-329",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7927",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-325",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7901",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-313",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7905",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-317",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7882",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-328",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7913",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-320",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7910",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-318",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7884",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-308",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7930",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7903",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-315",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7911",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7925",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-323",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7881",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-327",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1113",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "107675",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "4D85A7A9-A091-4C59-84E6-73C8B6639498",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-157985",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-327"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "db": "VULHUB",
        "id": "VHN-157985"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-089"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6550"
      }
    ]
  },
  "id": "VAR-201904-0181",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "db": "VULHUB",
        "id": "VHN-157985"
      }
    ],
    "trust": 1.44565702
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      }
    ]
  },
  "last_update_date": "2024-07-23T22:21:36.530000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 4.9,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
      },
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 4.9,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-091-01"
      },
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-092-01"
      },
      {
        "title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/157945"
      },
      {
        "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91013"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-327"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-089"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-157985"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6550"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 7.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
      },
      {
        "trust": 4.9,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-091-01"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-585/"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/bid/107675"
      },
      {
        "trust": 0.7,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-092-01"
      },
      {
        "trust": 0.6,
        "url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
      },
      {
        "trust": 0.6,
        "url": "https://www.advantech.com/"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6550"
      },
      {
        "trust": 0.6,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-330/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/78318"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-327"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "db": "VULHUB",
        "id": "VHN-157985"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-089"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6550"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-327"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "db": "VULHUB",
        "id": "VHN-157985"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-089"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6550"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-04-03T00:00:00",
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-327"
      },
      {
        "date": "2019-04-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "date": "2019-04-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-157985"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201904-089"
      },
      {
        "date": "2019-04-05T19:29:00.310000",
        "db": "NVD",
        "id": "CVE-2019-6550"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-322"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-311"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-329"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-325"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-313"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-317"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-328"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-320"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-318"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-308"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-330"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-315"
      },
      {
        "date": "2019-07-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-585"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-323"
      },
      {
        "date": "2019-04-02T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-327"
      },
      {
        "date": "2019-04-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      },
      {
        "date": "2020-10-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-157985"
      },
      {
        "date": "2020-10-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201904-089"
      },
      {
        "date": "2020-10-06T14:02:16.967000",
        "db": "NVD",
        "id": "CVE-2019-6550"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-089"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess/SCADA Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-08948"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-089"
      }
    ],
    "trust": 0.8
  }
}

VAR-202310-0320

Vulnerability from variot - Updated: 2024-05-23 22:50

Advantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized actor vulnerability that could leak user credentials. Advantech Provided by the company WebAccess The following vulnerabilities exist in. It was * information leak (CWE-200) - CVE-2023-4215If the vulnerability is exploited, it may be affected as follows. It was * When configuring or changing your account information on that device; Cloud Agent Debug User credentials are stolen using the service

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202310-0320",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "9.1.3"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
        "version": "version 9.1.3"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4215"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:9.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2023-4215"
      }
    ]
  },
  "cve": "CVE-2023-4215",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ics-cert@hq.dhs.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 8.6,
            "baseSeverity": "High",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2023-003824",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2023-4215",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "ics-cert@hq.dhs.gov",
            "id": "CVE-2023-4215",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2023-003824",
            "trust": 0.8,
            "value": "High"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4215"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4215"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized actor vulnerability that could leak user credentials. Advantech Provided by the company WebAccess The following vulnerabilities exist in. It was * information leak (CWE-200) - CVE-2023-4215If the vulnerability is exploited, it may be affected as follows. It was * When configuring or changing your account information on that device; Cloud Agent Debug User credentials are stolen using the service",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2023-4215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2023-4215",
        "trust": 2.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-285-15",
        "trust": 1.8
      },
      {
        "db": "JVN",
        "id": "JVNVU93637774",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4215"
      }
    ]
  },
  "id": "VAR-202310-0320",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.43267184
  },
  "last_update_date": "2024-05-23T22:50:37.013000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "WebAccess/SCADA",
        "trust": 0.8,
        "url": "https://www.advantech.com/en/support/details/installation?id=1-ms9mjv"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "information leak (CWE-200) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4215"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-15"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu93637774/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2023-4215"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4215"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4215"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-10-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      },
      {
        "date": "2023-10-17T00:15:11.327000",
        "db": "NVD",
        "id": "CVE-2023-4215"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-05-22T07:49:00",
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      },
      {
        "date": "2023-10-20T18:30:13.407000",
        "db": "NVD",
        "id": "CVE-2023-4215"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech\u00a0 Made \u00a0WebAccess\u00a0 information disclosure vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-003824"
      }
    ],
    "trust": 0.8
  }
}

VAR-201805-0169

Vulnerability from variot - Updated: 2024-02-13 22:42

Advantech WebAccess 8.1 and earlier contains a DLL hijacking vulnerability which may allow an attacker to run a malicious DLL file within the search path resulting in execution of arbitrary code. Advantech WebAccess Contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A DLL hijacking vulnerability exists in Advantech WebAccess 8.1 and earlier. Advantech WebAccess is prone to a local arbitrary code-execution vulnerability because it fails to sanitize user-supplied input. Advantech WebAccess 8.1 and prior are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0169",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "model": "webaccess",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "db": "BID",
        "id": "96210"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5175"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-5175"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Li MingZheng Kuangn",
    "sources": [
      {
        "db": "BID",
        "id": "96210"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-5175",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2017-5175",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2017-02043",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-113378",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-5175",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-5175",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-02043",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201702-609",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-113378",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-5175",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113378"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5175"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5175"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess 8.1 and earlier contains a DLL hijacking vulnerability which may allow an attacker to run a malicious DLL file within the search path resulting in execution of arbitrary code. Advantech WebAccess Contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A DLL hijacking vulnerability exists in Advantech WebAccess 8.1 and earlier. Advantech WebAccess is prone to a local arbitrary code-execution vulnerability because it fails to sanitize user-supplied input. \nAdvantech WebAccess 8.1 and prior are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-5175"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "db": "BID",
        "id": "96210"
      },
      {
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113378"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5175"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-5175",
        "trust": 3.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-045-01",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "96210",
        "trust": 2.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-609",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013424",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "E867D17F-0F33-4C9B-9B45-EE5B53126343",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-113378",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5175",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113378"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5175"
      },
      {
        "db": "BID",
        "id": "96210"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5175"
      }
    ]
  },
  "id": "VAR-201805-0169",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113378"
      }
    ],
    "trust": 1.33267184
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      }
    ]
  },
  "last_update_date": "2024-02-13T22:42:04.534000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.co.jp/industrial-automation/webaccess"
      },
      {
        "title": "Advantech WebAccess DLL hijacking vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/89770"
      },
      {
        "title": "Advantech WebAccess Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=68206"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-427",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-113378"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5175"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-045-01"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/96210"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5175"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5175"
      },
      {
        "trust": 0.3,
        "url": "http://webaccess.advantech.com"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-045-01 "
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/427.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113378"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5175"
      },
      {
        "db": "BID",
        "id": "96210"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5175"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113378"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5175"
      },
      {
        "db": "BID",
        "id": "96210"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5175"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-02-26T00:00:00",
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "date": "2017-02-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "date": "2018-05-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113378"
      },
      {
        "date": "2018-05-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-5175"
      },
      {
        "date": "2017-02-14T00:00:00",
        "db": "BID",
        "id": "96210"
      },
      {
        "date": "2018-07-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "date": "2017-02-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      },
      {
        "date": "2018-05-09T19:29:00.247000",
        "db": "NVD",
        "id": "CVE-2017-5175"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-02-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113378"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-5175"
      },
      {
        "date": "2017-03-07T03:03:00",
        "db": "BID",
        "id": "96210"
      },
      {
        "date": "2018-07-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-013424"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      },
      {
        "date": "2019-10-09T23:28:12.853000",
        "db": "NVD",
        "id": "CVE-2017-5175"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "96210"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess DLL Hijacking vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-02043"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "e867d17f-0f33-4c9b-9b45-ee5b53126343"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-609"
      }
    ],
    "trust": 0.8
  }
}

VAR-201202-0218

Vulnerability from variot - Updated: 2024-02-13 22:31

Stack-based buffer overflow in opcImg.asp in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via unspecified vectors. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition. Other attacks are possible. ----------------------------------------------------------------------

Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool.

Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/


TITLE: Advantech OPC Server ADAM ActiveX Control Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA46775

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46775/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46775

RELEASE DATE: 2011-11-07

DISCUSS ADVISORY: http://secunia.com/advisories/46775/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/46775/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=46775

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in Advantech OPC Server, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error in the ADAM ActiveX control and can be exploited to cause a buffer overflow.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is reported in the following components: * Advantech ADAM OPC Server versions prior to V3.01.012. * Advantech Modbus RTU OPC Server versions prior to V3.01.010. * Advantech Modbus TCP OPC Server versions prior to V3.01.010.

SOLUTION: Reportedly a patch has been released. Contact the vendor for further information.

PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Security Research and Service Institute Information and Communication Security Technology Center (ICST).

ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201202-0218",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "5.0"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "6.0"
      },
      {
        "model": "broadwin webaccess",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "7.0"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "broadwin",
        "version": "7.0"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "advantech",
        "version": "7.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "6.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "advantech webaccess",
        "version": "5.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "advantech webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      },
      {
        "db": "BID",
        "id": "52051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0238"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "6.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-0238"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sense Vulnerability Coordination Team, Greg MacManus of iSIGHT Partners, Kuang-Chun Hung of Security Research and Service Institute-Information and Communication Security Technology Center (ICST), Luigi Auriemma, and\nSnake (alias).",
    "sources": [
      {
        "db": "BID",
        "id": "52051"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-0238",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2012-0238",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-53519",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2012-0238",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-0238",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201202-414",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-53519",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2012-0238",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-0238"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0238"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Stack-based buffer overflow in opcImg.asp in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via unspecified vectors. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. \nExploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------\n\nOvum says ad hoc tools are out-dated. The best practice approach?\nFast vulnerability intelligence, threat handling, and setup in one tool. \n\nRead the new report on the Secunia VIM:\nhttp://secunia.com/products/corporate/vim/ovum_2011_request/ \n\n----------------------------------------------------------------------\n\nTITLE:\nAdvantech OPC Server ADAM ActiveX Control Buffer Overflow\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA46775\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/46775/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46775\n\nRELEASE DATE:\n2011-11-07\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/46775/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/46775/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46775\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Advantech OPC Server, which can\nbe exploited by malicious people to compromise a user\u0027s system. \n\nThe vulnerability is caused due to an error in the ADAM ActiveX\ncontrol and can be exploited to cause a buffer overflow. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerability is reported in the following components:\n* Advantech ADAM OPC Server versions prior to V3.01.012. \n* Advantech Modbus RTU OPC Server versions prior to V3.01.010. \n* Advantech Modbus TCP OPC Server versions prior to V3.01.010. \n\nSOLUTION:\nReportedly a patch has been released. Contact the vendor for further\ninformation. \n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Security Research and Service Institute Information\nand Communication Security Technology Center (ICST). \n\nORIGINAL ADVISORY:\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-0238"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      },
      {
        "db": "BID",
        "id": "52051"
      },
      {
        "db": "IVD",
        "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-0238"
      },
      {
        "db": "PACKETSTORM",
        "id": "106765"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-0238",
        "trust": 3.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-047-01",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "52051",
        "trust": 1.5
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-414",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-0667",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-047-01A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-11-279-01",
        "trust": 0.4
      },
      {
        "db": "IVD",
        "id": "19D8C7F0-2354-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "SECUNIA",
        "id": "46775",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-53519",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-0238",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "106765",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-0238"
      },
      {
        "db": "BID",
        "id": "52051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      },
      {
        "db": "PACKETSTORM",
        "id": "106765"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0238"
      }
    ]
  },
  "id": "VAR-201202-0218",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53519"
      }
    ],
    "trust": 1.550159445
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      }
    ]
  },
  "last_update_date": "2024-02-13T22:31:46.275000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.co.jp/products/webaccess-hmi-scada-software/sub_gf-1m94v.aspx"
      },
      {
        "title": "WebAccess",
        "trust": 0.8,
        "url": "http://www.broadwin.com/features.htm"
      },
      {
        "title": "Offices Distributors",
        "trust": 0.8,
        "url": "http://www.broadwin.com/offices.htm"
      },
      {
        "title": "\u30d1\u30fc\u30c8\u30ca\u30fc\u60c5\u5831",
        "trust": 0.8,
        "url": "http://www.advantech.co.jp/support-ajp/distributors.asp"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.advantech.co.jp/"
      },
      {
        "title": "Patch for Advantech WebAccess Buffer Overflow Vulnerability (CNVD-2012-0667)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/10251"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-53519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0238"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-047-01.pdf"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/bid/52051"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0238"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-047-01a.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0238"
      },
      {
        "trust": 0.4,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-279-01.pdf"
      },
      {
        "trust": 0.3,
        "url": "http://webaccess.advantech.com/product.php"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46775"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/vim/ovum_2011_request/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/46775/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/46775/#comments"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-0238"
      },
      {
        "db": "BID",
        "id": "52051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      },
      {
        "db": "PACKETSTORM",
        "id": "106765"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0238"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-0238"
      },
      {
        "db": "BID",
        "id": "52051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      },
      {
        "db": "PACKETSTORM",
        "id": "106765"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0238"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-02-20T00:00:00",
        "db": "IVD",
        "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-02-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      },
      {
        "date": "2012-02-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-53519"
      },
      {
        "date": "2012-02-21T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-0238"
      },
      {
        "date": "2012-02-16T00:00:00",
        "db": "BID",
        "id": "52051"
      },
      {
        "date": "2012-02-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      },
      {
        "date": "2011-11-09T12:04:37",
        "db": "PACKETSTORM",
        "id": "106765"
      },
      {
        "date": "2012-02-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201202-414"
      },
      {
        "date": "2012-02-21T13:31:57.093000",
        "db": "NVD",
        "id": "CVE-2012-0238"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-02-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-0667"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-53519"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-0238"
      },
      {
        "date": "2012-02-16T00:00:00",
        "db": "BID",
        "id": "52051"
      },
      {
        "date": "2012-02-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      },
      {
        "date": "2012-02-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201202-414"
      },
      {
        "date": "2018-01-05T02:29:18.447000",
        "db": "NVD",
        "id": "CVE-2012-0238"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-414"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech/BroadWin WebAccess of  opcImg.asp Vulnerable to stack-based buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001556"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "19d8c7f0-2354-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-414"
      }
    ],
    "trust": 0.8
  }
}

VAR-201810-0128

Vulnerability from variot - Updated: 2024-02-13 22:30

Advantech WebAccess 8.3.2 and below is vulnerable to a stack buffer overflow vulnerability. A remote authenticated attacker could potentially exploit this vulnerability by sending a crafted HTTP request to broadweb/system/opcImg.asp. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0128",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "8.3.2"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.3.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.3.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15704"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.3.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-15704"
      }
    ]
  },
  "cve": "CVE-2018-15704",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 9.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2018-15704",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-21797",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-125990",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2018-15704",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2018-15704",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-21797",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201810-1121",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-125990",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2018-15704",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      },
      {
        "db": "VULHUB",
        "id": "VHN-125990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15704"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess 8.3.2 and below is vulnerable to a stack buffer overflow vulnerability. A remote authenticated attacker could potentially exploit this vulnerability by sending a crafted HTTP request to broadweb/system/opcImg.asp. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-15704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      },
      {
        "db": "IVD",
        "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-125990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15704"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-15704",
        "trust": 3.4
      },
      {
        "db": "TENABLE",
        "id": "TRA-2018-33",
        "trust": 2.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1121",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21797",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "E2FE7AB1-39AB-11E9-8710-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-125990",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15704",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      },
      {
        "db": "VULHUB",
        "id": "VHN-125990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15704"
      }
    ]
  },
  "id": "VAR-201810-0128",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      },
      {
        "db": "VULHUB",
        "id": "VHN-125990"
      }
    ],
    "trust": 1.33267184
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      }
    ]
  },
  "last_update_date": "2024-02-13T22:30:41.829000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
      },
      {
        "title": "Check Point Security Alerts: Advantech WebAccess Buffer Overflow (CVE-2018-15704)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=check_point_security_alerts\u0026qid=ead700aab13b40fd4fe05b6f6af7e21e"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2018-15704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-125990"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15704"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "https://www.tenable.com/security/research/tra-2018-33"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15704"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15704"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://advisories.checkpoint.com/defense/advisories/public/2024/cpai-2018-2677.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      },
      {
        "db": "VULHUB",
        "id": "VHN-125990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15704"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      },
      {
        "db": "VULHUB",
        "id": "VHN-125990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15704"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-26T00:00:00",
        "db": "IVD",
        "id": "e2fe7ab1-39ab-11e9-8710-000c29342cb1"
      },
      {
        "date": "2018-10-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      },
      {
        "date": "2018-10-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-125990"
      },
      {
        "date": "2018-10-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-15704"
      },
      {
        "date": "2019-01-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "date": "2018-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      },
      {
        "date": "2018-10-22T19:29:00.453000",
        "db": "NVD",
        "id": "CVE-2018-15704"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21797"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-125990"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-15704"
      },
      {
        "date": "2019-01-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "date": "2020-08-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      },
      {
        "date": "2020-08-24T17:37:01.140000",
        "db": "NVD",
        "id": "CVE-2018-15704"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1121"
      }
    ],
    "trust": 0.6
  }
}

VAR-201708-1119

Vulnerability from variot - Updated: 2024-02-06 22:53

A heap-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to the heap-based buffer, which could allow an attacker to execute arbitrary code under the context of the process. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. Multiple heap-based buffer-overflow vulnerabilities. 3. Multiple memory-corruption vulnerabilities. 4. An SQL-injection vulnerability. 5. A format-string vulnerability. 6. An authentication-bypass vulnerability. 7. A security-bypass vulnerability. 8. A privilege-escalation vulnerability. 9. A remote-code execution vulnerability. This may aid in further attacks. Advantech WebAccess versions prior to V8.2_20170817 are vulnerable. The vulnerability stems from the fact that the program does not fully verify the length of the data submitted by the user

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1119",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "8.2"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "advantech",
        "version": "8.2_20170817"
      },
      {
        "model": "webaccess \u003cv8.2 20170817",
        "scope": null,
        "trust": 0.6,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess 8.2 20170330",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess 8.1 20160519",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess 8.0 20150816",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8"
      },
      {
        "model": "webaccess 8.2 20170817",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "db": "BID",
        "id": "100526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12704"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-12704"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Fritz Sands, rgod, Tenable Network Security,an anonymous researcher all working with Trend Micro??s Zero Day Initiative, and Haojun Hou and DongWang from ADLab of Venustech.",
    "sources": [
      {
        "db": "BID",
        "id": "100526"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-12704",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2017-12704",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-23883",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-103253",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-12704",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-12704",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-23883",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201708-1280",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-103253",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-12704",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "db": "VULHUB",
        "id": "VHN-103253"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12704"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A heap-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to the heap-based buffer, which could allow an attacker to execute arbitrary code under the context of the process. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2. Multiple heap-based buffer-overflow vulnerabilities. \n3. Multiple memory-corruption vulnerabilities. \n4.  An SQL-injection vulnerability. \n5. A format-string vulnerability. \n6. An authentication-bypass vulnerability. \n7. A security-bypass vulnerability. \n8. A privilege-escalation vulnerability. \n9. A remote-code execution vulnerability. This may  aid in further attacks. \nAdvantech WebAccess versions prior to V8.2_20170817 are vulnerable. The vulnerability stems from the fact that the program does not fully verify the length of the data submitted by the user",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-12704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "db": "BID",
        "id": "100526"
      },
      {
        "db": "IVD",
        "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9"
      },
      {
        "db": "VULHUB",
        "id": "VHN-103253"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12704"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-12704",
        "trust": 3.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-241-02",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "100526",
        "trust": 2.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "96D43DE0-3F58-40E3-841A-E1B2D8A8FCD9",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-103253",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12704",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "db": "VULHUB",
        "id": "VHN-103253"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12704"
      },
      {
        "db": "BID",
        "id": "100526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12704"
      }
    ]
  },
  "id": "VAR-201708-1119",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "db": "VULHUB",
        "id": "VHN-103253"
      }
    ],
    "trust": 1.582453675
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      }
    ]
  },
  "last_update_date": "2024-02-06T22:53:18.967000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.com/industrial-automation/webaccess"
      },
      {
        "title": "Patch for Advantech WebAccess HEAP Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/101167"
      },
      {
        "title": "Advantech WebAccess Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=74369"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-103253"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12704"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-241-02"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/100526"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12704"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12704"
      },
      {
        "trust": 0.3,
        "url": "http://webaccess.advantech.com"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "db": "VULHUB",
        "id": "VHN-103253"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12704"
      },
      {
        "db": "BID",
        "id": "100526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12704"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "db": "VULHUB",
        "id": "VHN-103253"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12704"
      },
      {
        "db": "BID",
        "id": "100526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12704"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-30T00:00:00",
        "db": "IVD",
        "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9"
      },
      {
        "date": "2017-08-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "date": "2017-08-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-103253"
      },
      {
        "date": "2017-08-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-12704"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "BID",
        "id": "100526"
      },
      {
        "date": "2017-09-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "date": "2017-08-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      },
      {
        "date": "2017-08-30T18:29:00.407000",
        "db": "NVD",
        "id": "CVE-2017-12704"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-23883"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-103253"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-12704"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "BID",
        "id": "100526"
      },
      {
        "date": "2017-09-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      },
      {
        "date": "2019-10-09T23:23:10.230000",
        "db": "NVD",
        "id": "CVE-2017-12704"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007399"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "96d43de0-3f58-40e3-841a-e1b2d8a8fcd9"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1280"
      }
    ],
    "trust": 0.8
  }
}

VAR-201409-0441

Vulnerability from variot - Updated: 2024-02-06 22:43

Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter. Advantech WebAccess is an IE-based HMI/SCADA monitoring software featuring all engineering projects, database setup, drawing and software management using standard browsers over the internet or intranet. A buffer overflow vulnerability exists in Advantech WebAccess. An attacker exploits a vulnerability to execute arbitrary code in the context of an affected application or to crash the entire application. Advantech WebAccess is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit attempts will likely cause a denial-of-service condition. Advantech WebAccess 7.2 is vulnerable; other versions may also be affected. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. Core Security - Corelabs Advisory http://corelabs.coresecurity.com/

Advantech WebAccess Vulnerabilities

  1. Advisory Information

    Title: Advantech WebAccess Vulnerabilities Advisory ID: CORE-2014-0005 Advisory URL: http://www.coresecurity.com/advisories/advantech-webaccess-vulnerabilities Date published: 2014-09-02 Date of last update: 2014-09-01 Vendors contacted: Advantech Release mode: User release

  2. Vulnerability Description

    Advantech WebAccess [1] is a browser-based software package for human-machine interfaces HMI, and supervisory control and data acquisition SCADA.

  3. WebAccess 7.2 .

  4. Non-vulnerable packages

. AdvantechWebAccessUSANode_20140730_3.4.3

  1. Vendor Information, Solutions and Workarounds

    Advantech has addressed the vulnerability in WebAccess by issuing an update located at http://webaccess.advantech.com/downloads_software.php

    Given that this is a client-side vulnerability, affected users should avoid opening untrusted '.html' files. Core Security also recommends those affected use third party software such as Sentinel [4] or EMET [3] that could help to prevent the exploitation of affected systems to some extent.

  2. Credits

    This vulnerability was discovered and researched by Ricardo Narvaja from Core Security Exploit Writers Team.

    Core Security Advisories Team would also like to thank ICS-CERT Coordination Center for their assistance during the vulnerability reporting process.

  3. Below is shown the result of opening a malicious html file with a long NodeName parameter, an attacker can overflow the stack buffer mentioned above and overwrite the SEH (Structured Exception Handler), enabling arbitrary code execution on the machine.

/-----

EAX 03A39942 ASCII "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB..." ECX 0162B720 EDX 01630000 xpsp2res.01630000 EBX 0162B720 ESP 0162B454 EBP 0162B460 ESI 0162B4D8 EDI 03A31E98 EIP 064EA6D4 webvact.064EA6D4

-----/

/-----

SEH chain of thread 000016CC Address SE handler 0162DB40 42424242

-----/

  1. Report Timeline . 2014-05-06: Core Security notifies Advantech of the vulnerability. Publication date is set for May 26th, 2014. 2014-05-09: CORE asks for a reply. 2014-05-26: First release date missed. 2014-05-26: Core Security notifies that the issues were reported 2 weeks ago and there was no reply since May 6th, 2014. 2014-05-29: Core Security contacts the ICS-CERT for assistance in order to coordinate the disclosure of the advisory. 2014-05-29: ICS-CERT acknowledges Core Security e-mail, and asks for a technical description of the vulnerability. 2014-05-29: Core Security sends technical details to the ICS-CERT. 2014-06-05: ICS-CERT team notifies that they have contacted the vendor and that they will notify us once the vendor has validated the vulnerabilities. 2014-06-18: ICS-CERT team notifies that the vendor is working in a new release, expected to be released in September, and ask if Core Security is interested in validating Advantech's vulnerability fix in their beta version. 2014-06-18: Core Security accepts the testing of the vendor beta version, but shares their concerns about waiting several months for fixes that are related to vulnerabilities already public. 2014-06-18: ICS-CERT notifies that they will let us know when they plan to make the beta version available for testing. 2014-07-03: ICS-CERT team notifies that the vendor is working to provide a download link for the beta version. 2014-07-08: ICS-CERT team sends download link provided by the vendor. 2014-07-10: Core Security confirms to ICS-CERT that the new version it's still vulnerable, and comments that after some analysis the vulnerable function doesn't has changes. 2014-07-10: ICS-CERT notifies that they will let the vendor know that that the vulnerabilities still exist. And asks to setup a teleconference between Core Security, the CERT and the vendor. 2014-07-10: Core Security notifies the ICS-CERT that all interactions are made via email only. 2014-07-10: ICS-CERT notifies they provided the information to the vendor. 2014-07-21: Core Security notifies the ICS-CERT that Tipping Point Zero Day Initiative has released several advisories[2] affecting the vendor including some that appears to be related to the one we are coordinating. 2014-07-21: ICS-CERT notifies that some of those advisories where in coordination with them, and that after a review of the link shared by Core Security are related to ICSA-14-198-02 and don't appear to be related to the reported vulnerability. 2014-07-21: Core Security notifies that ZDI-14-243 and ZDI-14-244 appears to be directly related. 2014-07-21: ICS-CERT is trying to contact Advantech to get a status update and their current plan for vulnerability remediation. 2014-08-07: ICS-CERT notifies that they contacted the vendor and they are waiting for an status update. 2014-08-21: Core Security contacts ICS-CERT since no reply was received in the past two weeks. 2014-08-21: ICS-CERT notifies that vendor representative stated that they are currently training a new product manager and they have not yet responded to the vulnerabilities we are discussing. 2014-08-28: Core Security notifies the ICS-CERT that the advisory publication is going to be scheduled for Monday 1st of September. 2014-08-28: ICS-CERT acknowledges Core Security e-mail. 2014-08-28: Core Security re-schedules the advisory publication for Sep 2nd, 2014. 2014-09-02: Core Security found out that the vendor released a silent fix on 30th of July. 2014-09-02: Core Security releases the advisory CORE-2014-0005 tagged as user-release.

  2. References

    [1] http://webaccess.advantech.com/. [2] http://www.zerodayinitiative.com/advisories/published/. [3] http://support.microsoft.com/kb/2458544. [4] https://github.com/CoreSecurity/sentinel.

  3. About CoreLabs

    CoreLabs, the research center of Core Security, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://corelabs.coresecurity.com.

  4. About Core Security Technologies

    Core Security Technologies enables organizations to get ahead of threats with security test and measurement solutions that continuously identify and demonstrate real-world exposures to their most critical assets. Our customers can gain real visibility into their security standing, real validation of their security controls, and real metrics to more effectively secure their organizations.

    Core Security's software solutions build on over a decade of trusted research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Core Security Technologies can be reached at +1 (617) 399-6980 or on the Web at: http://www.coresecurity.com.

  5. Disclaimer

    The contents of this advisory are copyright (c) 2014 Core Security and (c) 2014 CoreLabs, and are licensed under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 (United States) License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/

  6. PGP/GPG Keys

    This advisory has been signed with the GPG key of Core Security advisories team, which is available for download at

http://www.coresecurity.com/files/attachments/core_security_advisories.asc

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201409-0441",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 3.0,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "advantech webaccess",
        "version": "7.2"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d2831bd2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0987"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-0987"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ricardo Narvaja",
    "sources": [
      {
        "db": "BID",
        "id": "69532"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-0987",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2014-0987",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-05423",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "d2831bd2-2351-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-68480",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-0987",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-05423",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201409-734",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "d2831bd2-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-68480",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2014-0987",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d2831bd2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68480"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0987"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0987"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter. Advantech WebAccess is an IE-based HMI/SCADA monitoring software featuring all engineering projects, database setup, drawing and software management using standard browsers over the internet or intranet. A buffer overflow vulnerability exists in Advantech WebAccess. An attacker exploits a vulnerability to execute arbitrary code in the context of an affected application or to crash the entire application. Advantech WebAccess is prone to a stack-based buffer-overflow  vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit  attempts will likely cause a  denial-of-service condition. \nAdvantech WebAccess 7.2 is vulnerable; other versions may also be affected. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. Core Security - Corelabs Advisory\nhttp://corelabs.coresecurity.com/\n\nAdvantech WebAccess Vulnerabilities\n\n\n1. *Advisory Information*\n\n    Title: Advantech WebAccess Vulnerabilities\n    Advisory ID: CORE-2014-0005\n    Advisory URL:\nhttp://www.coresecurity.com/advisories/advantech-webaccess-vulnerabilities\n    Date published: 2014-09-02\n    Date of last update: 2014-09-01\n    Vendors contacted: Advantech\n    Release mode: User release\n\n\n2. *Vulnerability Description*\n\n    Advantech WebAccess [1] is a browser-based\n    software package for human-machine interfaces HMI, and supervisory\n    control and data acquisition SCADA. \n\n\n4. WebAccess 7.2\n   . \n\n\n5. *Non-vulnerable packages*\n\n   . AdvantechWebAccessUSANode_20140730_3.4.3\n\n\n6. *Vendor Information, Solutions and Workarounds*\n\n    Advantech has addressed the vulnerability in WebAccess by issuing an\nupdate located at\n    http://webaccess.advantech.com/downloads_software.php\n\n    Given that this is a client-side vulnerability, affected users\nshould avoid\n    opening untrusted \u0027.html\u0027 files. \n    Core Security also recommends those affected use third party\nsoftware such as\n    Sentinel [4] or EMET [3]\n    that could help to prevent the exploitation of affected systems to\nsome extent. \n\n\n7. *Credits*\n\n    This vulnerability was discovered and researched by Ricardo Narvaja\nfrom\n    Core Security Exploit Writers Team. \n    \n    Core Security Advisories Team would also like to thank  ICS-CERT\nCoordination Center\n    for their assistance during the vulnerability reporting process. \n    \n\n8. \n\n    Below is shown the result of opening a malicious html file with a long\n    NodeName parameter, an attacker can overflow the stack buffer mentioned\n    above and overwrite the SEH (Structured Exception Handler), enabling\n    arbitrary code execution on the machine. \n\n/-----\n \nEAX 03A39942 ASCII \"BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB...\"\nECX 0162B720\nEDX 01630000 xpsp2res.01630000\nEBX 0162B720\nESP 0162B454\nEBP 0162B460\nESI 0162B4D8\nEDI 03A31E98\nEIP 064EA6D4 webvact.064EA6D4\n\n-----/\n\n\n/-----\n \nSEH chain of thread 000016CC\nAddress    SE handler\n0162DB40   42424242\n\n-----/\n\n\n9. *Report Timeline*\n    . 2014-05-06: Core Security notifies Advantech of the vulnerability. \nPublication date is set for May 26th, 2014. 2014-05-09: CORE asks for a reply. 2014-05-26: First release date missed. 2014-05-26: Core Security notifies that the issues were reported 2\nweeks ago and there was no reply since May 6th, 2014. 2014-05-29: Core Security contacts the ICS-CERT for assistance in\norder to coordinate the disclosure of the advisory. 2014-05-29: ICS-CERT acknowledges Core Security e-mail, and asks\nfor a technical description of the vulnerability. 2014-05-29: Core Security sends technical details to the ICS-CERT. 2014-06-05: ICS-CERT team notifies that they have contacted the\nvendor and that they will notify us once the vendor has validated the\nvulnerabilities. 2014-06-18: ICS-CERT team notifies that the vendor is working in a\nnew release, expected to be released in September, and ask if Core\nSecurity is interested in validating Advantech\u0027s vulnerability fix in\ntheir beta version. 2014-06-18: Core Security accepts the testing of the vendor beta\nversion, but shares their concerns about waiting several months for\nfixes that are related to vulnerabilities already public. 2014-06-18: ICS-CERT notifies that they will let us know when they\nplan to make the beta version available for testing. 2014-07-03: ICS-CERT team notifies that the vendor is working to\nprovide a download link for the beta version. 2014-07-08: ICS-CERT team sends download link provided by the vendor. 2014-07-10: Core Security confirms to ICS-CERT that the new\nversion it\u0027s still vulnerable, and comments that after some analysis the\nvulnerable function doesn\u0027t has changes. 2014-07-10: ICS-CERT notifies that they will let the vendor know\nthat that the vulnerabilities still exist. And asks to setup a\nteleconference between Core Security, the CERT and the vendor. 2014-07-10: Core Security notifies the ICS-CERT that all\ninteractions are made via email only. 2014-07-10: ICS-CERT notifies they provided the information to the\nvendor. 2014-07-21: Core Security notifies the ICS-CERT that Tipping Point\nZero Day Initiative has released several advisories[2] affecting the\nvendor including some that appears to be related to the one we are\ncoordinating. 2014-07-21: ICS-CERT notifies that some of those advisories where\nin coordination with them, and that after a review of the link shared by\nCore Security are related to ICSA-14-198-02 and don\u0027t appear to be\nrelated to the reported vulnerability. 2014-07-21: Core Security notifies that ZDI-14-243 and ZDI-14-244\nappears to be directly related. 2014-07-21: ICS-CERT is trying to contact Advantech to get a\nstatus update and their current plan for vulnerability remediation. 2014-08-07: ICS-CERT notifies that they contacted the vendor and\nthey are waiting for an status update. 2014-08-21: Core Security contacts ICS-CERT since no reply was\nreceived in the past two weeks. 2014-08-21: ICS-CERT notifies that vendor representative stated\nthat they are currently training a new product manager and they have not\nyet responded to the vulnerabilities we are discussing. 2014-08-28: Core Security notifies the ICS-CERT that the advisory\npublication is going to be scheduled for Monday 1st of September. 2014-08-28: ICS-CERT acknowledges Core Security e-mail. 2014-08-28: Core Security re-schedules the advisory publication\nfor Sep 2nd, 2014. 2014-09-02: Core Security found out that the vendor released a\nsilent fix on 30th of July. 2014-09-02: Core Security releases the advisory CORE-2014-0005\ntagged as user-release. \n\n\n10. *References*\n\n    [1] http://webaccess.advantech.com/. \n    [2] http://www.zerodayinitiative.com/advisories/published/. \n    [3] http://support.microsoft.com/kb/2458544. \n    [4] https://github.com/CoreSecurity/sentinel. \n\n\n11. *About CoreLabs*\n\n    CoreLabs, the research center of Core Security, is charged with\nanticipating\n    the future needs and requirements for information security\ntechnologies. \n    We conduct our research in several important areas of computer security\n    including system vulnerabilities, cyber attack planning and simulation,\n    source code auditing, and cryptography. Our results include problem\n    formalization, identification of vulnerabilities, novel solutions and\n    prototypes for new technologies. CoreLabs regularly publishes security\n    advisories, technical papers, project information and shared software\n    tools for public use at:\n    http://corelabs.coresecurity.com. \n\n\n12. *About Core Security Technologies*\n\n    Core Security Technologies enables organizations to get ahead of threats\n    with security test and measurement solutions that continuously identify\n    and demonstrate real-world exposures to their most critical assets. Our\n    customers can gain real visibility into their security standing, real\n    validation of their security controls, and real metrics to more\n    effectively secure their organizations. \n\n    Core Security\u0027s software solutions build on over a decade of trusted\n    research and leading-edge threat expertise from the company\u0027s Security\n    Consulting Services, CoreLabs and Engineering groups. Core Security\n    Technologies can be reached at +1 (617) 399-6980 or on the Web at:\n    http://www.coresecurity.com. \n\n\n13. *Disclaimer*\n\n    The contents of this advisory are copyright\n    (c) 2014 Core Security and (c) 2014 CoreLabs,\n    and are licensed under a Creative Commons\n    Attribution Non-Commercial Share-Alike 3.0 (United States) License:\n    http://creativecommons.org/licenses/by-nc-sa/3.0/us/\n\n\n14. *PGP/GPG Keys*\n\n    This advisory has been signed with the GPG key of Core Security\nadvisories\n    team, which is available for download at\n   \nhttp://www.coresecurity.com/files/attachments/core_security_advisories.asc",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-0987"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "db": "BID",
        "id": "69532"
      },
      {
        "db": "IVD",
        "id": "d2831bd2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68480"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0987"
      },
      {
        "db": "PACKETSTORM",
        "id": "128120"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-0987",
        "trust": 3.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-261-01",
        "trust": 3.2
      },
      {
        "db": "BID",
        "id": "69532",
        "trust": 2.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-734",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353",
        "trust": 0.8
      },
      {
        "db": "CXSECURITY",
        "id": "WLB-2014090006",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "D2831BD2-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-68480",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0987",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "128120",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d2831bd2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68480"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0987"
      },
      {
        "db": "BID",
        "id": "69532"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "db": "PACKETSTORM",
        "id": "128120"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0987"
      }
    ]
  },
  "id": "VAR-201409-0441",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "d2831bd2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68480"
      }
    ],
    "trust": 1.33267184
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d2831bd2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      }
    ]
  },
  "last_update_date": "2024-02-06T22:43:57.539000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.co.jp/products/gf-1m94v/advantech-webaccess/mod_b975c492-56b3-4eba-8bbb-5b6d3483ee9d.aspx"
      },
      {
        "title": "Patch for Advantech WebAccess Buffer Overflow Vulnerability (CNVD-2014-05423)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/53293"
      },
      {
        "title": "AdvantechWebAccessUSANode_20140730_3.4.3",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=51645"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-68480"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0987"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-261-01"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/bid/69532"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0987"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0987"
      },
      {
        "trust": 0.6,
        "url": "http://cxsecurity.com/issue/wlb-2014090006"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=35592"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0987"
      },
      {
        "trust": 0.1,
        "url": "http://corelabs.coresecurity.com/"
      },
      {
        "trust": 0.1,
        "url": "http://webaccess.advantech.com/."
      },
      {
        "trust": 0.1,
        "url": "http://www.coresecurity.com."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0988"
      },
      {
        "trust": 0.1,
        "url": "http://www.zerodayinitiative.com/advisories/published/."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0992"
      },
      {
        "trust": 0.1,
        "url": "http://www.coresecurity.com/advisories/advantech-webaccess-vulnerabilities"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-nc-sa/3.0/us/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0989"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/coresecurity/sentinel."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0991"
      },
      {
        "trust": 0.1,
        "url": "http://www.coresecurity.com/files/attachments/core_security_advisories.asc."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0990"
      },
      {
        "trust": 0.1,
        "url": "http://corelabs.coresecurity.com."
      },
      {
        "trust": 0.1,
        "url": "http://webaccess.advantech.com/downloads_software.php"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0986"
      },
      {
        "trust": 0.1,
        "url": "http://support.microsoft.com/kb/2458544."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0985"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68480"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0987"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "db": "PACKETSTORM",
        "id": "128120"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0987"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "d2831bd2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68480"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0987"
      },
      {
        "db": "BID",
        "id": "69532"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "db": "PACKETSTORM",
        "id": "128120"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0987"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-09-05T00:00:00",
        "db": "IVD",
        "id": "d2831bd2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-09-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "date": "2014-09-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-68480"
      },
      {
        "date": "2014-09-20T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-0987"
      },
      {
        "date": "2014-09-02T00:00:00",
        "db": "BID",
        "id": "69532"
      },
      {
        "date": "2014-09-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "date": "2014-09-02T22:28:11",
        "db": "PACKETSTORM",
        "id": "128120"
      },
      {
        "date": "2014-09-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      },
      {
        "date": "2014-09-20T10:55:04.027000",
        "db": "NVD",
        "id": "CVE-2014-0987"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-12-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-05423"
      },
      {
        "date": "2015-08-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-68480"
      },
      {
        "date": "2015-08-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-0987"
      },
      {
        "date": "2014-09-22T18:05:00",
        "db": "BID",
        "id": "69532"
      },
      {
        "date": "2014-09-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      },
      {
        "date": "2014-09-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      },
      {
        "date": "2015-08-05T16:03:44.433000",
        "db": "NVD",
        "id": "CVE-2014-0987"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Vulnerable to stack-based buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004353"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "d2831bd2-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-734"
      }
    ],
    "trust": 0.8
  }
}

VAR-201801-0138

Vulnerability from variot - Updated: 2023-12-26 22:44

A SQL Injection issue was discovered in WebAccess versions prior to 8.3. WebAccess does not properly sanitize its inputs for SQL commands. Advantech WebAccess Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within ChkAdminViewUsrPwd1, called from mailPg.asp. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code under the context of the web service. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple denial-of-service vulnerabilities 2. Multiple stack-based buffer-overflow vulnerabilities 3. A directory-traversal vulnerability 4. An SQL-injection vulnerability 5. Failed attacks will cause denial of service conditions. versions prior to Advantech WebAccess 8.3 are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0138",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": null,
        "trust": 3.5,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 2.4,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.0"
      },
      {
        "model": "webaccess 8.2 20170330",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.2"
      },
      {
        "model": "webaccess 8.1 20160519",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess 8.0 20150816",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8"
      },
      {
        "model": "webaccess",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-064"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-065"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-028"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "db": "BID",
        "id": "102424"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16716"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "8.3",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16716"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Steven Seeley (mr_me) of Offensive Security",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-028"
      }
    ],
    "trust": 2.1
  },
  "cve": "CVE-2017-16716",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2017-16716",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 3.5,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": true,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2017-16716",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-00669",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-107666",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-16716",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2017-16716",
            "trust": 3.5,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-16716",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-00669",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201801-244",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-107666",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-16716",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-064"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-065"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-028"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107666"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16716"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16716"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A SQL Injection issue was discovered in WebAccess versions prior to 8.3. WebAccess does not properly sanitize its inputs for SQL commands. Advantech WebAccess Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within ChkAdminViewUsrPwd1, called from mailPg.asp. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code under the context of the web service. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:\n1. Multiple denial-of-service vulnerabilities\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. A directory-traversal vulnerability\n4.  An SQL-injection vulnerability\n5. Failed attacks will cause denial of service conditions. \nversions prior to Advantech WebAccess 8.3 are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16716"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-064"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-065"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-028"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "db": "BID",
        "id": "102424"
      },
      {
        "db": "IVD",
        "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107666"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16716"
      }
    ],
    "trust": 5.94
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-107666",
        "trust": 0.1,
        "type": "unknown"
      },
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=43928",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-107666"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16716"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-16716",
        "trust": 7.2
      },
      {
        "db": "BID",
        "id": "102424",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-004-02",
        "trust": 2.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "43928",
        "trust": 1.2
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-244",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-004-02A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4994",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-026",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5398",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-064",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5407",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-065",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4995",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-027",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4996",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-028",
        "trust": 0.7
      },
      {
        "db": "NSFOCUS",
        "id": "38634",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "E2E0B981-39AB-11E9-83BA-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "146149",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-107666",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16716",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-064"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-065"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-028"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107666"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16716"
      },
      {
        "db": "BID",
        "id": "102424"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16716"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ]
  },
  "id": "VAR-201801-0138",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107666"
      }
    ],
    "trust": 1.4966049
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      }
    ]
  },
  "last_update_date": "2023-12-26T22:44:16.545000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 3.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-004-02"
      },
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.com/industrial-automation/webaccess"
      },
      {
        "title": "Patch for Advantech WebAccess SQL Injection Vulnerability (CNVD-2018-00669)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/113117"
      },
      {
        "title": "Advantech WebAccess SQL Repair measures for injecting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=77555"
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/lnick2023/nicenice "
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 "
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/qazbnm456/awesome-cve-poc "
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-064"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-065"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-028"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16716"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-89",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-107666"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16716"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 5.6,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-004-02"
      },
      {
        "trust": 3.3,
        "url": "http://www.securityfocus.com/bid/102424"
      },
      {
        "trust": 1.3,
        "url": "https://www.exploit-db.com/exploits/43928/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16716"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-004-02a"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16716"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/38634"
      },
      {
        "trust": 0.3,
        "url": "http://webaccess.advantech.com"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/89.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/qazbnm456/awesome-cve-poc"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-064"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-065"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-028"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107666"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16716"
      },
      {
        "db": "BID",
        "id": "102424"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16716"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-064"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-065"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-028"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107666"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16716"
      },
      {
        "db": "BID",
        "id": "102424"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16716"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-01-10T00:00:00",
        "db": "IVD",
        "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-064"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-065"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-028"
      },
      {
        "date": "2018-01-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-107666"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-16716"
      },
      {
        "date": "2018-01-04T00:00:00",
        "db": "BID",
        "id": "102424"
      },
      {
        "date": "2018-01-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "date": "2018-01-05T08:29:00.267000",
        "db": "NVD",
        "id": "CVE-2017-16716"
      },
      {
        "date": "2018-01-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-026"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-064"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-065"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-027"
      },
      {
        "date": "2018-01-05T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-028"
      },
      {
        "date": "2018-01-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-00669"
      },
      {
        "date": "2018-02-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-107666"
      },
      {
        "date": "2018-02-02T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-16716"
      },
      {
        "date": "2018-01-04T00:00:00",
        "db": "BID",
        "id": "102424"
      },
      {
        "date": "2018-04-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      },
      {
        "date": "2018-02-02T02:29:01.137000",
        "db": "NVD",
        "id": "CVE-2017-16716"
      },
      {
        "date": "2018-01-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess In  SQL Injection vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011764"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SQL injection",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e0b981-39ab-11e9-83ba-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201801-244"
      }
    ],
    "trust": 0.8
  }
}

VAR-201308-0031

Vulnerability from variot - Updated: 2023-12-18 13:44

Cross-site scripting (XSS) vulnerability in Advantech WebAccess (formerly BroadWin WebAccess) before 7.1 2013.05.30 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess HMI/SCADA has an unidentified cross-site script. Advantech WebAccess HMI/SCADA is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Advantech WebAccess HMI/SCADA 7.0 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201308-0031",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "6.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "5.0"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "7.0"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "advantech",
        "version": "7.1 2013.05.30"
      },
      {
        "model": "webaccess hmi/scada software",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "7.0-2012.12.05"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "advantech webaccess",
        "version": "5.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "advantech webaccess",
        "version": "6.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "advantech webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "bd2522e8-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00217"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-2299"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Antu Sanadi of SecPod Technologies",
    "sources": [
      {
        "db": "BID",
        "id": "57227"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-2299",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 3.5,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2013-2299",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "bd2522e8-2352-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "VHN-62301",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-2299",
            "trust": 1.8,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201301-127",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "bd2522e8-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-62301",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "bd2522e8-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62301"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site scripting (XSS) vulnerability in Advantech WebAccess (formerly BroadWin WebAccess) before 7.1 2013.05.30 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess HMI/SCADA has an unidentified cross-site script. Advantech WebAccess HMI/SCADA is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. \nAdvantech WebAccess HMI/SCADA 7.0 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-2299"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00217"
      },
      {
        "db": "BID",
        "id": "57227"
      },
      {
        "db": "IVD",
        "id": "bd2522e8-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62301"
      }
    ],
    "trust": 2.7
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-62301",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62301"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-2299",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-225-01",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "57227",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00217",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003848",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "BD2522E8-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "23968",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-77711",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-62301",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "bd2522e8-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00217"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62301"
      },
      {
        "db": "BID",
        "id": "57227"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ]
  },
  "id": "VAR-201308-0031",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "bd2522e8-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00217"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62301"
      }
    ],
    "trust": 1.61633592
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "bd2522e8-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00217"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:44:35.872000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.advantech.com/default.aspx"
      },
      {
        "title": "\u30d1\u30fc\u30c8\u30ca\u30fc\u60c5\u5831",
        "trust": 0.8,
        "url": "http://www.advantech.co.jp/support-ajp/distributors.asp"
      },
      {
        "title": "Advantech\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
        "trust": 0.8,
        "url": "http://www.advantech.co.jp/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62301"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2299"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-225-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2299"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2299"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/57227/"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/57227"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00217"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62301"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "bd2522e8-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00217"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62301"
      },
      {
        "db": "BID",
        "id": "57227"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-01-14T00:00:00",
        "db": "IVD",
        "id": "bd2522e8-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2013-01-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-00217"
      },
      {
        "date": "2013-08-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62301"
      },
      {
        "date": "2013-01-09T00:00:00",
        "db": "BID",
        "id": "57227"
      },
      {
        "date": "2013-08-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      },
      {
        "date": "2013-08-22T05:34:59.940000",
        "db": "NVD",
        "id": "CVE-2013-2299"
      },
      {
        "date": "2013-01-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-01-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-00217"
      },
      {
        "date": "2013-08-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62301"
      },
      {
        "date": "2013-08-14T06:06:00",
        "db": "BID",
        "id": "57227"
      },
      {
        "date": "2013-08-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003848"
      },
      {
        "date": "2013-08-23T13:37:02.987000",
        "db": "NVD",
        "id": "CVE-2013-2299"
      },
      {
        "date": "2013-08-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess HMI/SCADA Unknown Cross-Site Scripting Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "bd2522e8-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-127"
      }
    ],
    "trust": 0.6
  }
}

VAR-201912-0756

Vulnerability from variot - Updated: 2023-12-18 13:43

Advantech WebAccess before 8.4.3 allows unauthenticated remote attackers to execute arbitrary code or cause a denial of service (memory corruption) due to a stack-based buffer overflow when handling IOCTL 70533 RPC messages. Advantech WebAccess Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a set of HMI / SCADA software based on browser architecture by Advantech of Taiwan, China. The software supports dynamic graphic display and real-time data control, and provides the ability to remotely control and manage automation equipment.

A buffer overflow vulnerability exists in Advantech WebAccess versions prior to 8.4.3. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201912-0756",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 2.4,
        "vendor": "advantech",
        "version": "8.4.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3951"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "8.4.3",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-3951"
      }
    ]
  },
  "cve": "CVE-2019-3951",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2019-3951",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-45387",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-155386",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-3951",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2019-3951",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-45387",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201912-657",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-155386",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155386"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-657"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess before 8.4.3 allows unauthenticated remote attackers to execute arbitrary code or cause a denial of service (memory corruption) due to a stack-based buffer overflow when handling IOCTL 70533 RPC messages. Advantech WebAccess Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a set of HMI / SCADA software based on browser architecture by Advantech of Taiwan, China. The software supports dynamic graphic display and real-time data control, and provides the ability to remotely control and manage automation equipment. \n\nA buffer overflow vulnerability exists in Advantech WebAccess versions prior to 8.4.3. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-3951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "db": "IVD",
        "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155386"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-3951",
        "trust": 3.3
      },
      {
        "db": "TENABLE",
        "id": "TRA-2019-52",
        "trust": 3.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-657",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "C5586C26-C6EB-4540-AC12-D193950F7B2D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-155386",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155386"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-657"
      }
    ]
  },
  "id": "VAR-201912-0756",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155386"
      }
    ],
    "trust": 1.33267184
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:43:09.533000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "https://www.advantech.co.jp/industrial-automation/webaccess"
      },
      {
        "title": "Patch for Advantech WebAccess Buffer Overflow Vulnerability (CNVD-2019-45387)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/194185"
      },
      {
        "title": "Advantech WebAccess Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=105656"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-657"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-155386"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3951"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "https://www.tenable.com/security/research/tra-2019-52"
      },
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3951"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3951"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155386"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-657"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155386"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-657"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-12-16T00:00:00",
        "db": "IVD",
        "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d"
      },
      {
        "date": "2019-12-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "date": "2019-12-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-155386"
      },
      {
        "date": "2019-12-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "date": "2019-12-12T21:15:12.120000",
        "db": "NVD",
        "id": "CVE-2019-3951"
      },
      {
        "date": "2019-12-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-657"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-12-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-45387"
      },
      {
        "date": "2019-12-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-155386"
      },
      {
        "date": "2019-12-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      },
      {
        "date": "2019-12-18T19:56:48.257000",
        "db": "NVD",
        "id": "CVE-2019-3951"
      },
      {
        "date": "2020-06-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-657"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-657"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Vulnerable to out-of-bounds writing",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013206"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "c5586c26-c6eb-4540-ac12-d193950f7b2d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-657"
      }
    ],
    "trust": 0.8
  }
}

VAR-201802-1104

Vulnerability from variot - Updated: 2023-12-18 13:38

The VBWinExec function in Node\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to execute arbitrary OS commands via a single argument (aka the command parameter). Advantech WebAccess Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. The 'VBWinExec' function of the NodeAspVBObj.dll file in Advantech WebAccess version 8.3.0 has an operating system command injection vulnerability

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201802-1104",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "8.3.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8..3.0"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-6911"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-965"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:8.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-6911"
      }
    ]
  },
  "cve": "CVE-2018-6911",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2018-6911",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-136943",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2018-6911",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2018-6911",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201802-965",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-136943",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2018-6911",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-136943"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-6911"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-6911"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-965"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The VBWinExec function in Node\\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to execute arbitrary OS commands via a single argument (aka the command parameter). Advantech WebAccess Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. The \u0027VBWinExec\u0027 function of the NodeAspVBObj.dll file in Advantech WebAccess version 8.3.0 has an operating system command injection vulnerability",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-6911"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      },
      {
        "db": "VULHUB",
        "id": "VHN-136943"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-6911"
      }
    ],
    "trust": 1.8
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-136943",
        "trust": 0.1,
        "type": "unknown"
      },
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=44031",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-136943"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-6911"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-6911",
        "trust": 2.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "44031",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-965",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "146360",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-136943",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-6911",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-136943"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-6911"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-6911"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-965"
      }
    ]
  },
  "id": "VAR-201802-1104",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-136943"
      }
    ],
    "trust": 0.53267184
  },
  "last_update_date": "2023-12-18T13:38:43.676000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.co.jp/products/a7b4308c-a3d0-446c-8f03-0d098d4b2c31/advantech-webaccess/mod_b975c492-56b3-4eba-8bbb-5b6d3483ee9d"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-78",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-136943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-6911"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.7,
        "url": "https://www.exploit-db.com/exploits/44031/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-6911"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-6911"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/78.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-136943"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-6911"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-6911"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-965"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-136943"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-6911"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-6911"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-965"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-136943"
      },
      {
        "date": "2018-02-13T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-6911"
      },
      {
        "date": "2018-04-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      },
      {
        "date": "2018-02-13T14:29:00.217000",
        "db": "NVD",
        "id": "CVE-2018-6911"
      },
      {
        "date": "2018-02-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201802-965"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-136943"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-6911"
      },
      {
        "date": "2018-04-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      },
      {
        "date": "2019-08-02T18:35:40.893000",
        "db": "NVD",
        "id": "CVE-2018-6911"
      },
      {
        "date": "2019-08-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201802-965"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-965"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess In  OS Command injection vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002211"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "operating system commend injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-965"
      }
    ],
    "trust": 0.6
  }
}

VAR-202008-1237

Vulnerability from variot - Updated: 2023-12-18 13:32

Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a stack-based buffer overflow, which may allow remote code execution, disclosure/modification of information, or cause the application to crash. WebAccess HMI Designer Is Advantech Company Provides Human Machine Interface (HMI) Development software. WebAccess HMI Designer The following multiple vulnerabilities exist in. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within BwPFile.exe when invoked via IOCTL 0x2711. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. The product has functions such as data transmission, menu editing and text editing.

There is a buffer overflow vulnerability in Advantech WebAccess HMI Designer 2.1.9.31 and earlier versions, which is caused by the program's failure to correctly verify the data submitted by the user

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1237",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess\\/hmi designer",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "2.1.9.31"
      },
      {
        "model": "webaccess/hmi",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "advantech",
        "version": "version 2.1.9.31"
      },
      {
        "model": "webaccess",
        "scope": null,
        "trust": 0.7,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess hmi designer",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=2.1.9.31"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-953"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16215"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess\\/hmi_designer:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.1.9.31",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-16215"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Natnael Samson (@NattiSamson)",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-953"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2020-16215",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2020-49486",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-169271",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2020-16215",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA score",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-007354",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 3.2,
            "userInteraction": "Required",
            "vectorString": "3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA score",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-007354",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA score",
            "availabilityImpact": "None",
            "baseScore": 3.3,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-007354",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-16215",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "IPA",
            "id": "JVNDB-2020-007354",
            "trust": 3.2,
            "value": "High"
          },
          {
            "author": "NVD",
            "id": "CVE-2020-16215",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2020-007354",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2020-007354",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "ZDI",
            "id": "CVE-2020-16215",
            "trust": 0.7,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-49486",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202008-266",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-169271",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-16215",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-953"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "db": "VULHUB",
        "id": "VHN-169271"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16215"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-266"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a stack-based buffer overflow, which may allow remote code execution, disclosure/modification of information, or cause the application to crash. WebAccess HMI Designer Is Advantech Company Provides Human Machine Interface (HMI) Development software. WebAccess HMI Designer The following multiple vulnerabilities exist in. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess.  Authentication is not required to exploit this vulnerability.The specific flaw exists within BwPFile.exe when invoked via IOCTL 0x2711. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. The product has functions such as data transmission, menu editing and text editing. \n\r\n\r\nThere is a buffer overflow vulnerability in Advantech WebAccess HMI Designer 2.1.9.31 and earlier versions, which is caused by the program\u0027s failure to correctly verify the data submitted by the user",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-16215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-953"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "db": "VULHUB",
        "id": "VHN-169271"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16215"
      }
    ],
    "trust": 2.97
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-16215",
        "trust": 3.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-20-219-02",
        "trust": 2.6
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-953",
        "trust": 2.5
      },
      {
        "db": "JVN",
        "id": "JVNVU90924965",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-10144",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-266",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.2721",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "49122",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-169271",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16215",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-953"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "db": "VULHUB",
        "id": "VHN-169271"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16215"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-266"
      }
    ]
  },
  "id": "VAR-202008-1237",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "db": "VULHUB",
        "id": "VHN-169271"
      }
    ],
    "trust": 1.15961353
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:32:56.323000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Support \u0026 Download",
        "trust": 0.8,
        "url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-f6ug0t"
      },
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02"
      },
      {
        "title": "Patch for Advantech WebAccess HMI Designer buffer overflow vulnerability (CNVD-2020-49486)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/231118"
      },
      {
        "title": "Advantech WebAccess HMI Designer Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=125964"
      },
      {
        "title": "CVE-Flow",
        "trust": 0.1,
        "url": "https://github.com/404notf0und/cve-flow "
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-953"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-266"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-787",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-169271"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16215"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02"
      },
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16215"
      },
      {
        "trust": 1.8,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-20-953/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16229"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16215"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16217"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16207"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16211"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-16213"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90924965/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16217"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16207"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16211"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16213"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16229"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.2721/"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/49122"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/404notf0und/cve-flow"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-953"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "db": "VULHUB",
        "id": "VHN-169271"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16215"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-266"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-20-953"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "db": "VULHUB",
        "id": "VHN-169271"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16215"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-266"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-08-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-953"
      },
      {
        "date": "2020-08-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "date": "2020-08-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-169271"
      },
      {
        "date": "2020-08-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-16215"
      },
      {
        "date": "2020-08-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "date": "2020-08-06T19:15:13.817000",
        "db": "NVD",
        "id": "CVE-2020-16215"
      },
      {
        "date": "2020-08-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202008-266"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-08-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-953"
      },
      {
        "date": "2020-08-31T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-49486"
      },
      {
        "date": "2021-11-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-169271"
      },
      {
        "date": "2021-11-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-16215"
      },
      {
        "date": "2020-08-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      },
      {
        "date": "2021-11-22T16:20:25.800000",
        "db": "NVD",
        "id": "CVE-2020-16215"
      },
      {
        "date": "2021-11-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202008-266"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-266"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech Made  WebAccess HMI Designer Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-007354"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-266"
      }
    ],
    "trust": 0.6
  }
}

VAR-201705-3745

Vulnerability from variot - Updated: 2023-12-18 13:29

An Absolute Path Traversal issue was discovered in Advantech WebAccess Version 8.1 and prior. The absolute path traversal vulnerability has been identified, which may allow an attacker to traverse the file system to access restricted files or directories. Advantech WebAccess Contains a path traversal vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to cause a denial of service condition on vulnerable installations of Advantech WebAccess. Authentication is required to exploit this vulnerability.The specific flaw exists within odbcPg4.asp. An attacker can leverage this vulnerability to overwrite key web files which will disable functionality on the target machine. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A directory traversal vulnerability exists in Advantech WebAccess due to the application's failure to adequately filter user-supplied input. A remote attacker exploited the vulnerability to retrieve sensitive information and execute arbitrary code through a specially crafted request with a directory traversal sequence ('../'). This may aid in further attacks. Advantech WebAccess version 8.1 and prior are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3745",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": null,
        "trust": 0.7,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.1"
      },
      {
        "model": "webaccess 8.0 20150816",
        "scope": null,
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "model": "webaccess 8.2 20170330",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-322"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "db": "BID",
        "id": "98311"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7929"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-7929"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Zhou Yu",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-17-322"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2017-7929",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2017-7929",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "ZDI",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2017-7929",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2017-06980",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-116132",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "impactScore": 4.2,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.1,
            "baseSeverity": "High",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2017-7929",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-7929",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "ZDI",
            "id": "CVE-2017-7929",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-06980",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201704-931",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-116132",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-322"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7929"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An Absolute Path Traversal issue was discovered in Advantech WebAccess Version 8.1 and prior. The absolute path traversal vulnerability has been identified, which may allow an attacker to traverse the file system to access restricted files or directories. Advantech WebAccess Contains a path traversal vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers  to cause a denial of service condition on vulnerable installations of Advantech WebAccess. Authentication is required to exploit this vulnerability.The specific flaw exists within odbcPg4.asp.  An attacker can leverage this vulnerability to overwrite key web files which will disable functionality on the target machine. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A directory traversal vulnerability exists in Advantech WebAccess due to the application\u0027s failure to adequately filter user-supplied input. A remote attacker exploited the vulnerability to retrieve sensitive information and execute arbitrary code through a specially crafted request with a directory traversal sequence (\u0027../\u0027). This may aid in further attacks. \nAdvantech WebAccess version 8.1 and prior are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-7929"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-322"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "db": "BID",
        "id": "98311"
      },
      {
        "db": "IVD",
        "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116132"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-7929",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-124-03",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "98311",
        "trust": 2.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4013",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-322",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "72B8F504-9FAF-4E5E-9287-87F7CB248C3E",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-116132",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-322"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116132"
      },
      {
        "db": "BID",
        "id": "98311"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7929"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ]
  },
  "id": "VAR-201705-3745",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116132"
      }
    ],
    "trust": 1.437764485
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:29:17.529000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.com/industrial-automation/webaccess"
      },
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-124-03"
      },
      {
        "title": "Patch for Advantech WebAccess Directory Traversal Vulnerability (CNVD-2017-06980)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/93984"
      },
      {
        "title": "Advantech WebAccess Repair measures for path traversal vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=99746"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-17-322"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-22",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7929"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-124-03"
      },
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/98311"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7929"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7929"
      },
      {
        "trust": 0.3,
        "url": "http://www.advantech.in/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-17-322"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116132"
      },
      {
        "db": "BID",
        "id": "98311"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7929"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-322"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116132"
      },
      {
        "db": "BID",
        "id": "98311"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7929"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-05-19T00:00:00",
        "db": "IVD",
        "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e"
      },
      {
        "date": "2017-05-04T00:00:00",
        "db": "ZDI",
        "id": "ZDI-17-322"
      },
      {
        "date": "2017-05-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "date": "2017-05-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116132"
      },
      {
        "date": "2017-05-04T00:00:00",
        "db": "BID",
        "id": "98311"
      },
      {
        "date": "2017-06-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "date": "2017-05-06T00:29:00.490000",
        "db": "NVD",
        "id": "CVE-2017-7929"
      },
      {
        "date": "2017-04-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-05-04T00:00:00",
        "db": "ZDI",
        "id": "ZDI-17-322"
      },
      {
        "date": "2017-05-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-06980"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116132"
      },
      {
        "date": "2017-05-23T16:23:00",
        "db": "BID",
        "id": "98311"
      },
      {
        "date": "2017-06-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "date": "2019-10-09T23:29:59.843000",
        "db": "NVD",
        "id": "CVE-2017-7929"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Path traversal vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003931"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Path traversal",
    "sources": [
      {
        "db": "IVD",
        "id": "72b8f504-9faf-4e5e-9287-87f7cb248c3e"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-931"
      }
    ],
    "trust": 0.8
  }
}

VAR-201810-0492

Vulnerability from variot - Updated: 2023-12-18 13:28

WebAccess Versions 8.3.2 and prior. During installation, the application installer disables user access control and does not re-enable it after the installation is complete. This could allow an attacker to run elevated arbitrary code. WebAccess Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Advantech WebAccess Node. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the access controls that are set and modified during the installation of the product. Advantech (Advantech) WebAccess software is the core of Advantech's IoT application platform solution, providing users with a user interface based on HTML5 technology to achieve cross-platform and cross-browser data access experience. Advantech WebAccess is prone to the following security vulnerabilities: 1. A stack-based buffer overflow vulnerability 2. This may aid in further attacks. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0492",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "8.3.2"
      },
      {
        "model": "webaccess",
        "scope": null,
        "trust": 1.4,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "8.3.2"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.3.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8"
      },
      {
        "model": "webaccess",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1329"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17908"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.3.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-17908"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mat Powell of Trend Micro Zero Day Initiative",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1329"
      }
    ],
    "trust": 1.4
  },
  "cve": "CVE-2018-17908",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.2,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2018-17908",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-21936",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-128414",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.5,
            "id": "CVE-2018-17908",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.4,
            "userInteraction": "NONE",
            "vectorString": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2018-17908",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2018-17908",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-17908",
            "trust": 1.4,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-21936",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201810-1272",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-128414",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1329"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128414"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17908"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WebAccess Versions 8.3.2 and prior. During installation, the application installer disables user access control and does not re-enable it after the installation is complete. This could allow an attacker to run elevated arbitrary code. WebAccess Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Advantech WebAccess Node.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the access controls that are set and modified during the installation of the product. Advantech (Advantech) WebAccess software is the core of Advantech\u0027s IoT application platform solution, providing users with a user interface based on HTML5 technology to achieve cross-platform and cross-browser data access experience. Advantech WebAccess is prone to the following security vulnerabilities:\n1. A stack-based buffer overflow vulnerability\n2. This may aid in further attacks. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-17908"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1329"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128414"
      }
    ],
    "trust": 3.96
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-17908",
        "trust": 5.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-298-02",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "105736",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1041957",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1272",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011341",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7167",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1331",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7154",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1329",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2FEC8CF-39AB-11E9-89CC-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-128414",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1329"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128414"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17908"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ]
  },
  "id": "VAR-201810-0492",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128414"
      }
    ],
    "trust": 1.33267184
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:28:43.141000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 1.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-298-02"
      },
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada"
      },
      {
        "title": "Advantech WebAccess improper access control vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/143395"
      },
      {
        "title": "Advantech WebAccess Fixes for access control error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=86344"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1329"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-284",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-128414"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17908"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-298-02"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/105736"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1041957"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17908"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17908"
      },
      {
        "trust": 0.3,
        "url": "http://webaccess.advantech.com"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1329"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128414"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17908"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1329"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128414"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17908"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-28T00:00:00",
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "date": "2018-10-31T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "date": "2018-10-31T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1329"
      },
      {
        "date": "2018-10-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "date": "2018-10-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128414"
      },
      {
        "date": "2018-10-25T00:00:00",
        "db": "BID",
        "id": "105736"
      },
      {
        "date": "2019-01-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "date": "2018-10-29T18:29:08.277000",
        "db": "NVD",
        "id": "CVE-2018-17908"
      },
      {
        "date": "2018-10-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-31T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1331"
      },
      {
        "date": "2018-10-31T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1329"
      },
      {
        "date": "2018-10-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128414"
      },
      {
        "date": "2018-10-25T00:00:00",
        "db": "BID",
        "id": "105736"
      },
      {
        "date": "2019-01-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011341"
      },
      {
        "date": "2019-10-09T23:37:02.363000",
        "db": "NVD",
        "id": "CVE-2018-17908"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Improper Access Control Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21936"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Access control error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8cf-39ab-11e9-89cc-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1272"
      }
    ],
    "trust": 0.8
  }
}

VAR-201810-0493

Vulnerability from variot - Updated: 2023-12-18 13:28

WebAccess Versions 8.3.2 and prior. The application fails to properly validate the length of user-supplied data, causing a buffer overflow condition that allows for arbitrary remote code execution. WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability. The specific flaw exists within bwswfcfg.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech (Advantech) WebAccess software is the core of Advantech's IoT application platform solution, providing users with a user interface based on HTML5 technology to achieve cross-platform and cross-browser data access experience. A stack buffer overflow vulnerability exists in Advantech WebAccess. The vulnerability stems from the fact that the software failed to properly verify the length of the data provided by the user. Advantech WebAccess is prone to the following security vulnerabilities: 1. This may aid in further attacks. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0493",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "advantech",
        "version": "8.3.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "advantech",
        "version": "8.3.2"
      },
      {
        "model": "webaccess",
        "scope": null,
        "trust": 0.7,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "\u003c=8.3.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8"
      },
      {
        "model": "webaccess",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "advantech",
        "version": "8.3.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1330"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.3.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-17910"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mat Powell of Trend Micro Zero Day Initiative",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1330"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-17910",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 9.3,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2018-17910",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-21937",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-128417",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2018-17910",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-17910",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2018-17910",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-17910",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-21937",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201810-1273",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-128417",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1330"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128417"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WebAccess Versions 8.3.2 and prior. The application fails to properly validate the length of user-supplied data, causing a buffer overflow condition that allows for arbitrary remote code execution. WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability. The specific flaw exists within bwswfcfg.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech (Advantech) WebAccess software is the core of Advantech\u0027s IoT application platform solution, providing users with a user interface based on HTML5 technology to achieve cross-platform and cross-browser data access experience. A stack buffer overflow vulnerability exists in Advantech WebAccess. The vulnerability stems from the fact that the software failed to properly verify the length of the data provided by the user. Advantech WebAccess is prone to the following security vulnerabilities:\n1. This may aid in further attacks. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-17910"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1330"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "IVD",
        "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128417"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-17910",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-298-02",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "105736",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1041957",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1273",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7166",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1330",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2FEC8D0-39AB-11E9-B9A9-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-128417",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1330"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128417"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ]
  },
  "id": "VAR-201810-0493",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128417"
      }
    ],
    "trust": 1.33267184
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:28:43.188000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada"
      },
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-298-02"
      },
      {
        "title": "Patch for Advantech WebAccess Stack Buffer Overflow Vulnerability (CNVD-2018-21937)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/143397"
      },
      {
        "title": "Advantech WebAccess Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=86345"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1330"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-128417"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17910"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-298-02"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/105736"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1041957"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17910"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17910"
      },
      {
        "trust": 0.3,
        "url": "http://webaccess.advantech.com"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1330"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128417"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1330"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128417"
      },
      {
        "db": "BID",
        "id": "105736"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17910"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-28T00:00:00",
        "db": "IVD",
        "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1"
      },
      {
        "date": "2018-10-31T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1330"
      },
      {
        "date": "2018-10-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "date": "2018-10-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128417"
      },
      {
        "date": "2018-10-25T00:00:00",
        "db": "BID",
        "id": "105736"
      },
      {
        "date": "2019-01-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "date": "2018-10-29T18:29:08.823000",
        "db": "NVD",
        "id": "CVE-2018-17910"
      },
      {
        "date": "2018-10-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-31T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1330"
      },
      {
        "date": "2018-10-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21937"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128417"
      },
      {
        "date": "2018-10-25T00:00:00",
        "db": "BID",
        "id": "105736"
      },
      {
        "date": "2019-01-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      },
      {
        "date": "2019-10-09T23:37:02.613000",
        "db": "NVD",
        "id": "CVE-2018-17910"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WebAccess Buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-011340"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2fec8d0-39ab-11e9-b9a9-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1273"
      }
    ],
    "trust": 0.8
  }
}

VAR-201705-2332

Vulnerability from variot - Updated: 2023-12-18 13:24

upAdminPg.asp in Advantech WebAccess before 8.1_20160519 allows remote authenticated administrators to obtain sensitive password information via unspecified vectors. Authentication is required to exploit this vulnerability.The specific flaw exists within upAdminPg.asp. One project administrator can view other project administrators' passwords along with the system administrator's password. An attacker can leverage this vulnerability to escalate privileges within the system. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech, China. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. ActiveX is one of the components used to transmit dynamic images in surveillance. A version of ActiveX prior to Advantech WebAccess 8.1_20160519 has a security vulnerability. An attacker could exploit the vulnerability to insert or run arbitrary code on an affected system

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201705-2332",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "advantech",
        "version": "8.1_20160519"
      },
      {
        "model": "webaccess",
        "scope": null,
        "trust": 0.7,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess \u003c8.1 20160519",
        "scope": null,
        "trust": 0.6,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-429"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5810"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-5810"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Zhou Yu",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-429"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2016-5810",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2016-5810",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "ZDI",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2016-5810",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-10506",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-94629",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.2,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.9,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2016-5810",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-5810",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2016-5810",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-10506",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201610-867",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-94629",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-429"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5810"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "upAdminPg.asp in Advantech WebAccess before 8.1_20160519 allows remote authenticated administrators to obtain sensitive password information via unspecified vectors. Authentication is required to exploit this vulnerability.The specific flaw exists within upAdminPg.asp. One project administrator can view other project administrators\u0027 passwords along with the system administrator\u0027s password. An attacker can leverage this vulnerability to escalate privileges within the system. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech, China. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. ActiveX is one of the components used to transmit dynamic images in surveillance. A version of ActiveX prior to Advantech WebAccess 8.1_20160519 has a security vulnerability. An attacker could exploit the vulnerability to insert or run arbitrary code on an affected system",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-5810"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-429"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "db": "IVD",
        "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94629"
      }
    ],
    "trust": 3.06
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-5810",
        "trust": 4.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-173-01",
        "trust": 3.1
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-429",
        "trust": 2.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-867",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3746",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "29796EEF-56CD-4EE0-AEFC-005C9EC1B53A",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-94629",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-429"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5810"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ]
  },
  "id": "VAR-201705-2332",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94629"
      }
    ],
    "trust": 1.473478785
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:24:27.954000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.com/industrial-automation/webaccess"
      },
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-173-01"
      },
      {
        "title": "Advantech WebAccess ActiveX vulnerable patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/83391"
      },
      {
        "title": "Advantech WebAccess ActiveX Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65188"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-429"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5810"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-173-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-429"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5810"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5810"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-429"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5810"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-429"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5810"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-11-02T00:00:00",
        "db": "IVD",
        "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a"
      },
      {
        "date": "2016-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-429"
      },
      {
        "date": "2016-11-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "date": "2017-05-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94629"
      },
      {
        "date": "2017-06-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "date": "2017-05-02T14:59:00.487000",
        "db": "NVD",
        "id": "CVE-2016-5810"
      },
      {
        "date": "2016-10-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-429"
      },
      {
        "date": "2016-11-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-10506"
      },
      {
        "date": "2017-05-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94629"
      },
      {
        "date": "2017-06-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      },
      {
        "date": "2017-05-11T16:36:48.103000",
        "db": "NVD",
        "id": "CVE-2016-5810"
      },
      {
        "date": "2017-05-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess of  upAdminPg.asp Vulnerable to obtaining important password information",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008542"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-867"
      }
    ],
    "trust": 0.6
  }
}

VAR-201606-0258

Vulnerability from variot - Updated: 2023-12-18 13:24

Buffer overflow in Advantech WebAccess before 8.1_20160519 allows local users to cause a denial of service via a crafted DLL file. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in versions prior to Advantech WebAccess 8.1_20160519. An attacker could exploit this vulnerability to insert and execute arbitrary code with a specially crafted DLL file. Advantech WebAccess is prone to the following security vulnerabilities: 1. Unsafe ActiveX control local security vulnerability 2. A local buffer-overflow vulnerability Local attackers can exploit these issues to perform unauthorized actions and crash the affected application; denying service to legitimate users. Due to the nature of these issues, code-execution may be possible but this has not been confirmed

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0258",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "advantech",
        "version": "8.1_20160519"
      },
      {
        "model": "webaccess \u003c8.1 20160519",
        "scope": null,
        "trust": 0.6,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4528"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-4528"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Zhou Yu of Acorn Network Security.",
    "sources": [
      {
        "db": "BID",
        "id": "91346"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-4528",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2016-4528",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2016-04267",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "686c7746-d588-4c1e-99ee-d9fb20515c64",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-93347",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.3,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 5.0,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2016-4528",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-4528",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-04267",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201606-488",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "686c7746-d588-4c1e-99ee-d9fb20515c64",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-93347",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93347"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4528"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in Advantech WebAccess before 8.1_20160519 allows local users to cause a denial of service via a crafted DLL file. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in versions prior to Advantech WebAccess 8.1_20160519. An attacker could exploit this vulnerability to insert and execute arbitrary code with a specially crafted DLL file. Advantech WebAccess is prone to the following security vulnerabilities:\n1. Unsafe ActiveX control local security vulnerability\n2. A local buffer-overflow vulnerability\nLocal attackers can exploit these issues to perform unauthorized actions and crash the affected application; denying service to legitimate users. Due to  the nature of these issues, code-execution may be possible but this has not been confirmed",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-4528"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "db": "BID",
        "id": "91346"
      },
      {
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93347"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-4528",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-173-01",
        "trust": 3.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003326",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "91346",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "686C7746-D588-4C1E-99EE-D9FB20515C64",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-93347",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93347"
      },
      {
        "db": "BID",
        "id": "91346"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4528"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ]
  },
  "id": "VAR-201606-0258",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93347"
      }
    ],
    "trust": 1.473478785
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:24:27.873000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.com/industrial-automation/webaccess"
      },
      {
        "title": "Patch for Advantech WebAccess Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/78041"
      },
      {
        "title": "Advantech WebAccess Buffer Overflow Vulnerability Fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62414"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-93347"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4528"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-173-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4528"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4528"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93347"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4528"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93347"
      },
      {
        "db": "BID",
        "id": "91346"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4528"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-06-23T00:00:00",
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "date": "2016-06-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "date": "2016-06-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-93347"
      },
      {
        "date": "2016-06-21T00:00:00",
        "db": "BID",
        "id": "91346"
      },
      {
        "date": "2016-06-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "date": "2016-06-25T01:59:02.563000",
        "db": "NVD",
        "id": "CVE-2016-4528"
      },
      {
        "date": "2016-06-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-06-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "date": "2016-06-27T00:00:00",
        "db": "VULHUB",
        "id": "VHN-93347"
      },
      {
        "date": "2016-06-21T00:00:00",
        "db": "BID",
        "id": "91346"
      },
      {
        "date": "2016-06-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-003326"
      },
      {
        "date": "2016-06-27T17:14:46.213000",
        "db": "NVD",
        "id": "CVE-2016-4528"
      },
      {
        "date": "2016-06-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04267"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "686c7746-d588-4c1e-99ee-d9fb20515c64"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-488"
      }
    ],
    "trust": 0.8
  }
}

VAR-201606-0256

Vulnerability from variot - Updated: 2023-12-18 13:24

Unspecified ActiveX controls in Advantech WebAccess before 8.1_20160519 allow remote authenticated users to obtain sensitive information or modify data via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. An arbitrary code execution vulnerability exists in Advantech WebAccess prior to 8.1_20160519, which was caused by a program that marked an unsafe ActiveX control as safe-for-scripting. An attacker could exploit this vulnerability to insert and execute arbitrary code. Advantech WebAccess is prone to the following security vulnerabilities: 1. A local buffer-overflow vulnerability Local attackers can exploit these issues to perform unauthorized actions and crash the affected application; denying service to legitimate users. Due to the nature of these issues, code-execution may be possible but this has not been confirmed. Versions prior to Advantech WebAccess 8.1_20160519 are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0256",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "advantech",
        "version": "8.1_20160519"
      },
      {
        "model": "webaccess \u003c8.1 20160519",
        "scope": null,
        "trust": 0.6,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "8.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-4525"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Zhou Yu of Acorn Network Security.",
    "sources": [
      {
        "db": "BID",
        "id": "91346"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-4525",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 3.3,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2016-4525",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2016-04291",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "id": "VHN-93344",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.3,
            "impactScore": 5.2,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.6,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2016-4525",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-4525",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-04291",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201606-505",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-93344",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93344"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified ActiveX controls in Advantech WebAccess before 8.1_20160519 allow remote authenticated users to obtain sensitive information or modify data via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. An arbitrary code execution vulnerability exists in Advantech WebAccess prior to 8.1_20160519, which was caused by a program that marked an unsafe ActiveX control as safe-for-scripting. An attacker could exploit this vulnerability to insert and execute arbitrary code. Advantech WebAccess is prone to the following security vulnerabilities:\n1. A local buffer-overflow vulnerability\nLocal attackers can exploit these issues to perform unauthorized actions and crash the affected application; denying service to legitimate users. Due to  the nature of these issues, code-execution may be possible but this has not been confirmed. \nVersions prior to Advantech WebAccess 8.1_20160519 are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-4525"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "db": "BID",
        "id": "91346"
      },
      {
        "db": "IVD",
        "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93344"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-4525",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-173-01",
        "trust": 3.1
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2016.1575",
        "trust": 1.2
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-505",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003355",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "91346",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "D1BDA473-0057-42ED-8E3B-7D90BC3A661A",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-93344",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93344"
      },
      {
        "db": "BID",
        "id": "91346"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ]
  },
  "id": "VAR-201606-0256",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93344"
      }
    ],
    "trust": 1.473478785
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:24:27.915000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://www.advantech.com/industrial-automation/webaccess"
      },
      {
        "title": "Patch for Advantech WebAccess arbitrary code execution vulnerability (CNVD-2016-04291)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/78107"
      },
      {
        "title": "Advantech WebAccess Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62426"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-4525"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-173-01"
      },
      {
        "trust": 1.2,
        "url": "http://www.auscert.org.au/./render.html?it=36102"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4525"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4525"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93344"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93344"
      },
      {
        "db": "BID",
        "id": "91346"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4525"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-06-24T00:00:00",
        "db": "IVD",
        "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a"
      },
      {
        "date": "2016-06-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "date": "2016-06-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-93344"
      },
      {
        "date": "2016-06-21T00:00:00",
        "db": "BID",
        "id": "91346"
      },
      {
        "date": "2016-06-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      },
      {
        "date": "2016-06-25T01:59:01.457000",
        "db": "NVD",
        "id": "CVE-2016-4525"
      },
      {
        "date": "2016-06-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-06-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-04291"
      },
      {
        "date": "2016-06-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-93344"
      },
      {
        "date": "2016-06-21T00:00:00",
        "db": "BID",
        "id": "91346"
      },
      {
        "date": "2016-06-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      },
      {
        "date": "2016-06-28T14:21:49.963000",
        "db": "NVD",
        "id": "CVE-2016-4525"
      },
      {
        "date": "2016-06-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "91346"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Unspecified  ActiveX Vulnerabilities that capture important information in controls",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003355"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "IVD",
        "id": "d1bda473-0057-42ed-8e3b-7d90bc3a661a"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-505"
      }
    ],
    "trust": 0.8
  }
}

VAR-201407-0234

Vulnerability from variot - Updated: 2023-12-18 13:14

Unspecified vulnerability in Advantech WebAccess before 7.2 allows remote authenticated users to create or delete arbitrary files via unknown vectors. Authentication is not required to exploit this vulnerability. The specific flaw exists within the gmicons.asp functionality. An attacker may leverage this to run arbitrary code in the context of the WebAccess service. WebAccess HMI/SCADA software provides remote control and management, allowing users to easily view and configure automation equipment in facility management systems, power stations and building automation systems. Advantech WebAccess is prone to a remote code-execution vulnerability. Failed exploit attempts will likely cause a denial-of-service condition. Advantech WebAccess 7.1 and prior are vulnerable. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. There are security vulnerabilities in Advantech WebAccess 7.1 and earlier versions

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201407-0234",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "6.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "5.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "7.0"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 1.4,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "7.1"
      },
      {
        "model": "webaccess",
        "scope": null,
        "trust": 0.7,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "5.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "6.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003488"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2365"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-477"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2365"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "John Leitch",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-251"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2014-2365",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.5,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2014-2365",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2014-2365",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2014-04462",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "7d71e152-463f-11e9-af14-000c29342cb1",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "e482e66e-2351-11e6-abef-000c29c66e3d",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "VHN-70304",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-2365",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2014-2365",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-04462",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201407-477",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "7d71e152-463f-11e9-af14-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e482e66e-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-70304",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003488"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2365"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-477"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in Advantech WebAccess before 7.2 allows remote authenticated users to create or delete arbitrary files via unknown vectors. Authentication is not required to exploit this vulnerability. The specific flaw exists within the gmicons.asp functionality. An attacker may leverage this to run arbitrary code in the context of the WebAccess service. WebAccess HMI/SCADA software provides remote control and management, allowing users to easily view and configure automation equipment in facility management systems, power stations and building automation systems. Advantech WebAccess is prone to a remote code-execution vulnerability. Failed exploit attempts will likely cause a denial-of-service condition. \nAdvantech WebAccess 7.1 and prior are vulnerable. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. There are security vulnerabilities in Advantech WebAccess 7.1 and earlier versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2365"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003488"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "db": "BID",
        "id": "68718"
      },
      {
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70304"
      }
    ],
    "trust": 3.51
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-2365",
        "trust": 4.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-198-02",
        "trust": 2.5
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-477",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462",
        "trust": 1.0
      },
      {
        "db": "BID",
        "id": "68718",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003488",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2086",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-251",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "7D71E152-463F-11E9-AF14-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "E482E66E-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-70304",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70304"
      },
      {
        "db": "BID",
        "id": "68718"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003488"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2365"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-477"
      }
    ]
  },
  "id": "VAR-201407-0234",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70304"
      }
    ],
    "trust": 1.5326718400000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:14:46.736000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Downloads ::: WebAccess Software",
        "trust": 0.8,
        "url": "http://webaccess.advantech.com/downloads.php?item=software"
      },
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://webaccess.advantech.com/"
      },
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-198-02"
      },
      {
        "title": "Patch for Advantech WebAccess Remote Code Execution Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/47712"
      },
      {
        "title": "AdvantechWebAccessCHNNode_20140606_3.4.3",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=50905"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003488"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-477"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2365"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.2,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-198-02"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2365"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2365"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/68718"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003488"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2365"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-477"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70304"
      },
      {
        "db": "BID",
        "id": "68718"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003488"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2365"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-477"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-07-22T00:00:00",
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "date": "2014-07-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70304"
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "BID",
        "id": "68718"
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003488"
      },
      {
        "date": "2014-07-19T05:09:27.627000",
        "db": "NVD",
        "id": "CVE-2014-2365"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-477"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      },
      {
        "date": "2014-07-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70304"
      },
      {
        "date": "2014-07-22T00:07:00",
        "db": "BID",
        "id": "68718"
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003488"
      },
      {
        "date": "2014-07-23T17:39:18.790000",
        "db": "NVD",
        "id": "CVE-2014-2365"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-477"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-477"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Remote code execution vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-251"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04462"
      }
    ],
    "trust": 1.7
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Code injection",
    "sources": [
      {
        "db": "IVD",
        "id": "7d71e152-463f-11e9-af14-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e482e66e-2351-11e6-abef-000c29c66e3d"
      }
    ],
    "trust": 0.4
  }
}

VAR-201407-0237

Vulnerability from variot - Updated: 2023-12-18 13:14

The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists with the bwocxrun ActiveX control, which allows for navigation from the network to the local file system. When combined with system settings and other components included as part of the installation, this allows for the activation of ActiveX controls resident on the local file system (even if not installed) without user interaction. An attacker can use this to install vulnerable controls on the target system. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess is prone to a remote security weakness. This may aid in further attacks. Advantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There is a security vulnerability in the 'BrowseFolder' method in the bwocxrun ActiveX control of Advantech WebAccess 7.1 and earlier

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201407-0237",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "6.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "5.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "7.0"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 1.4,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "advantech",
        "version": "7.1"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "7.1"
      },
      {
        "model": "webaccess",
        "scope": null,
        "trust": 0.7,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "5.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "6.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc401-463f-11e9-82e2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e49f790a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-245"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2368"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2368"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Anonymous",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-245"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2014-2368",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2014-2368",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-2368",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-04532",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "7d7fc401-463f-11e9-82e2-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "e49f790a-2351-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-70307",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-2368",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2014-2368",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-04532",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201407-480",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "7d7fc401-463f-11e9-82e2-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e49f790a-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-70307",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc401-463f-11e9-82e2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e49f790a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-245"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70307"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2368"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists with the bwocxrun ActiveX control, which allows for navigation from the network to the local file system. When combined with system settings and other components included as part of the installation, this allows for the activation of ActiveX controls resident on the local file system (even if not installed) without user interaction. An attacker can use this to install vulnerable controls on the target system. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess is prone to a remote security weakness. This may aid in further attacks. \nAdvantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There is a security vulnerability in the \u0027BrowseFolder\u0027 method in the bwocxrun ActiveX control of Advantech WebAccess 7.1 and earlier",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2368"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-245"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "db": "BID",
        "id": "68715"
      },
      {
        "db": "IVD",
        "id": "7d7fc401-463f-11e9-82e2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e49f790a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70307"
      }
    ],
    "trust": 3.51
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-2368",
        "trust": 4.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-198-02",
        "trust": 3.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-480",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532",
        "trust": 1.0
      },
      {
        "db": "BID",
        "id": "68715",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003491",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2061",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-245",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "7D7FC401-463F-11E9-82E2-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "E49F790A-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-70307",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc401-463f-11e9-82e2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e49f790a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-245"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70307"
      },
      {
        "db": "BID",
        "id": "68715"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2368"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ]
  },
  "id": "VAR-201407-0237",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc401-463f-11e9-82e2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e49f790a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70307"
      }
    ],
    "trust": 1.5326718400000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc401-463f-11e9-82e2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e49f790a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:14:46.647000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Downloads ::: WebAccess Software",
        "trust": 0.8,
        "url": "http://webaccess.advantech.com/downloads.php?item=software"
      },
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://webaccess.advantech.com/"
      },
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-198-02"
      },
      {
        "title": "Advantech WebAccess bwocxrun unsafe ActiveX control information disclosure vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/47825"
      },
      {
        "title": "AdvantechWebAccessCHNNode_20140606_3.4.3",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=50905"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-245"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70307"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2368"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.8,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-198-02"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2368"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2368"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-245"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70307"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2368"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "7d7fc401-463f-11e9-82e2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e49f790a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-245"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70307"
      },
      {
        "db": "BID",
        "id": "68715"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2368"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-07-24T00:00:00",
        "db": "IVD",
        "id": "7d7fc401-463f-11e9-82e2-000c29342cb1"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "IVD",
        "id": "e49f790a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-245"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "date": "2014-07-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70307"
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "BID",
        "id": "68715"
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "date": "2014-07-19T05:09:27.753000",
        "db": "NVD",
        "id": "CVE-2014-2368"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-245"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      },
      {
        "date": "2014-07-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70307"
      },
      {
        "date": "2014-07-22T00:07:00",
        "db": "BID",
        "id": "68715"
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003491"
      },
      {
        "date": "2014-07-23T18:48:01.977000",
        "db": "NVD",
        "id": "CVE-2014-2368"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess bwocxrun Unsafe ActiveX Control Information Disclosure Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc401-463f-11e9-82e2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e49f790a-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04532"
      }
    ],
    "trust": 1.0
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-480"
      }
    ],
    "trust": 0.6
  }
}

VAR-201407-0236

Vulnerability from variot - Updated: 2023-12-18 13:14

The ChkCookie subroutine in an ActiveX control in broadweb/include/gChkCook.asp in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call. This vulnerability allows remote attackers to bypass authentication requirements on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ChkCookieNoRedir function. By providing arbitrary values to certain fields, an attacker can receive a session authentication cookie despite receiving an error message. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. If you set user, proj, and scada are set and bwuser is true, you can access multiple restricted pages. This may aid in further attacks. Advantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201407-0236",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "6.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "5.0"
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "advantech",
        "version": "7.0"
      },
      {
        "model": "webaccess",
        "scope": "lt",
        "trust": 1.4,
        "vendor": "advantech",
        "version": "7.2"
      },
      {
        "model": "webaccess",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "advantech",
        "version": "7.1"
      },
      {
        "model": "webaccess",
        "scope": null,
        "trust": 0.7,
        "vendor": "advantech",
        "version": null
      },
      {
        "model": "webaccess",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "advantech",
        "version": "7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "5.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "6.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "advantech webaccess",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc402-463f-11e9-b23e-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-479"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.1",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2367"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "John Leitch",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-249"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2014-2367",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2014-2367",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-2367",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-04531",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "7d7fc402-463f-11e9-b23e-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-70306",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-2367",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2014-2367",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-04531",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201407-479",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "7d7fc402-463f-11e9-b23e-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-70306",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc402-463f-11e9-b23e-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70306"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-479"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The ChkCookie subroutine in an ActiveX control in broadweb/include/gChkCook.asp in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call. This vulnerability allows remote attackers to bypass authentication requirements on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ChkCookieNoRedir function. By providing arbitrary values to certain fields, an attacker can receive a session authentication cookie despite receiving an error message. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. If you set user, proj, and scada are set and bwuser is true, you can access multiple restricted pages. This may aid in further attacks. \nAdvantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2367"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "db": "BID",
        "id": "68716"
      },
      {
        "db": "IVD",
        "id": "7d7fc402-463f-11e9-b23e-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70306"
      }
    ],
    "trust": 3.51
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-2367",
        "trust": 4.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-198-02",
        "trust": 3.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-479",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531",
        "trust": 1.0
      },
      {
        "db": "BID",
        "id": "68716",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003490",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-2079",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-249",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "7D7FC402-463F-11E9-B23E-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "E4A5D23C-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-70306",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc402-463f-11e9-b23e-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70306"
      },
      {
        "db": "BID",
        "id": "68716"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-479"
      }
    ]
  },
  "id": "VAR-201407-0236",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc402-463f-11e9-b23e-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70306"
      }
    ],
    "trust": 1.5326718400000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc402-463f-11e9-b23e-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:14:46.692000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Downloads ::: WebAccess Software",
        "trust": 0.8,
        "url": "http://webaccess.advantech.com/downloads.php?item=software"
      },
      {
        "title": "Advantech WebAccess",
        "trust": 0.8,
        "url": "http://webaccess.advantech.com/"
      },
      {
        "title": "Advantech has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-198-02"
      },
      {
        "title": "Advantech WebAccess Remote Verification Bypass Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/47826"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70306"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2367"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.8,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-198-02"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2367"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2367"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70306"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-479"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "7d7fc402-463f-11e9-b23e-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70306"
      },
      {
        "db": "BID",
        "id": "68716"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2367"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-479"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-07-24T00:00:00",
        "db": "IVD",
        "id": "7d7fc402-463f-11e9-b23e-000c29342cb1"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "IVD",
        "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "date": "2014-07-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70306"
      },
      {
        "date": "2014-07-15T00:00:00",
        "db": "BID",
        "id": "68716"
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      },
      {
        "date": "2014-07-19T05:09:27.720000",
        "db": "NVD",
        "id": "CVE-2014-2367"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-479"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-07-18T00:00:00",
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      },
      {
        "date": "2014-07-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70306"
      },
      {
        "date": "2014-07-22T00:07:00",
        "db": "BID",
        "id": "68716"
      },
      {
        "date": "2014-07-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-003490"
      },
      {
        "date": "2014-07-23T18:47:15.103000",
        "db": "NVD",
        "id": "CVE-2014-2367"
      },
      {
        "date": "2014-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201407-479"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-479"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Advantech WebAccess Remote Authentication Bypass Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "7d7fc402-463f-11e9-b23e-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "e4a5d23c-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "ZDI",
        "id": "ZDI-14-249"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-04531"
      }
    ],
    "trust": 1.7
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201407-479"
      }
    ],
    "trust": 0.6
  }
}