var-201705-2332
Vulnerability from variot
upAdminPg.asp in Advantech WebAccess before 8.1_20160519 allows remote authenticated administrators to obtain sensitive password information via unspecified vectors. Authentication is required to exploit this vulnerability.The specific flaw exists within upAdminPg.asp. One project administrator can view other project administrators' passwords along with the system administrator's password. An attacker can leverage this vulnerability to escalate privileges within the system. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech, China. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. ActiveX is one of the components used to transmit dynamic images in surveillance. A version of ActiveX prior to Advantech WebAccess 8.1_20160519 has a security vulnerability. An attacker could exploit the vulnerability to insert or run arbitrary code on an affected system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201705-2332", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.1" }, { "model": "webaccess", "scope": "lt", "trust": 0.8, "vendor": "advantech", "version": "8.1_20160519" }, { "model": "webaccess", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null }, { "model": "webaccess \u003c8.1 20160519", "scope": null, "trust": 0.6, "vendor": "advantech", "version": null }, { "model": "webaccess", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "8.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a" }, { "db": "ZDI", "id": "ZDI-16-429" }, { "db": "CNVD", "id": "CNVD-2016-10506" }, { "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "db": "NVD", "id": "CVE-2016-5810" }, { "db": "CNNVD", "id": "CNNVD-201610-867" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.1", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-5810" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zhou Yu", "sources": [ { "db": "ZDI", "id": "ZDI-16-429" } ], "trust": 0.7 }, "cve": "CVE-2016-5810", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-5810", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "ZDI", "availabilityImpact": "NONE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2016-5810", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-10506", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-94629", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-5810", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-5810", "trust": 1.8, "value": "MEDIUM" }, { "author": "ZDI", "id": "CVE-2016-5810", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2016-10506", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201610-867", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-94629", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a" }, { "db": "ZDI", "id": "ZDI-16-429" }, { "db": "CNVD", "id": "CNVD-2016-10506" }, { "db": "VULHUB", "id": "VHN-94629" }, { "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "db": "NVD", "id": "CVE-2016-5810" }, { "db": "CNNVD", "id": "CNNVD-201610-867" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "upAdminPg.asp in Advantech WebAccess before 8.1_20160519 allows remote authenticated administrators to obtain sensitive password information via unspecified vectors. Authentication is required to exploit this vulnerability.The specific flaw exists within upAdminPg.asp. One project administrator can view other project administrators\u0027 passwords along with the system administrator\u0027s password. An attacker can leverage this vulnerability to escalate privileges within the system. Advantech WebAccess (formerly known as BroadWin WebAccess) is a suite of browser-based HMI/SCADA software from Advantech, China. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. ActiveX is one of the components used to transmit dynamic images in surveillance. A version of ActiveX prior to Advantech WebAccess 8.1_20160519 has a security vulnerability. An attacker could exploit the vulnerability to insert or run arbitrary code on an affected system", "sources": [ { "db": "NVD", "id": "CVE-2016-5810" }, { "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "db": "ZDI", "id": "ZDI-16-429" }, { "db": "CNVD", "id": "CNVD-2016-10506" }, { "db": "IVD", "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a" }, { "db": "VULHUB", "id": "VHN-94629" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-5810", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-16-173-01", "trust": 3.1 }, { "db": "ZDI", "id": "ZDI-16-429", "trust": 2.4 }, { "db": "CNNVD", "id": "CNNVD-201610-867", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2016-10506", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-008542", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3746", "trust": 0.7 }, { "db": "IVD", "id": "29796EEF-56CD-4EE0-AEFC-005C9EC1B53A", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-94629", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a" }, { "db": "ZDI", "id": "ZDI-16-429" }, { "db": "CNVD", "id": "CNVD-2016-10506" }, { "db": "VULHUB", "id": "VHN-94629" }, { "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "db": "NVD", "id": "CVE-2016-5810" }, { "db": "CNNVD", "id": "CNNVD-201610-867" } ] }, "id": "VAR-201705-2332", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a" }, { "db": "CNVD", "id": "CNVD-2016-10506" }, { "db": "VULHUB", "id": "VHN-94629" } ], "trust": 1.473478785 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a" }, { "db": "CNVD", "id": "CNVD-2016-10506" } ] }, "last_update_date": "2023-12-18T13:24:27.954000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "http://www.advantech.com/industrial-automation/webaccess" }, { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-173-01" }, { "title": "Advantech WebAccess ActiveX vulnerable patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83391" }, { "title": "Advantech WebAccess ActiveX Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65188" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-429" }, { "db": "CNVD", "id": "CNVD-2016-10506" }, { "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "db": "CNNVD", "id": "CNNVD-201610-867" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-94629" }, { "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "db": "NVD", "id": "CVE-2016-5810" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-173-01" }, { "trust": 1.7, "url": "http://www.zerodayinitiative.com/advisories/zdi-16-429" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5810" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5810" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-429" }, { "db": "CNVD", "id": "CNVD-2016-10506" }, { "db": "VULHUB", "id": "VHN-94629" }, { "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "db": "NVD", "id": "CVE-2016-5810" }, { "db": "CNNVD", "id": "CNNVD-201610-867" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a" }, { "db": "ZDI", "id": "ZDI-16-429" }, { "db": "CNVD", "id": "CNVD-2016-10506" }, { "db": "VULHUB", "id": "VHN-94629" }, { "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "db": "NVD", "id": "CVE-2016-5810" }, { "db": "CNNVD", "id": "CNNVD-201610-867" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-02T00:00:00", "db": "IVD", "id": "29796eef-56cd-4ee0-aefc-005c9ec1b53a" }, { "date": "2016-07-18T00:00:00", "db": "ZDI", "id": "ZDI-16-429" }, { "date": "2016-11-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-10506" }, { "date": "2017-05-02T00:00:00", "db": "VULHUB", "id": "VHN-94629" }, { "date": "2017-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "date": "2017-05-02T14:59:00.487000", "db": "NVD", "id": "CVE-2016-5810" }, { "date": "2016-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-867" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-18T00:00:00", "db": "ZDI", "id": "ZDI-16-429" }, { "date": "2016-11-02T00:00:00", "db": "CNVD", "id": "CNVD-2016-10506" }, { "date": "2017-05-11T00:00:00", "db": "VULHUB", "id": "VHN-94629" }, { "date": "2017-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008542" }, { "date": "2017-05-11T16:36:48.103000", "db": "NVD", "id": "CVE-2016-5810" }, { "date": "2017-05-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-867" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-867" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess of upAdminPg.asp Vulnerable to obtaining important password information", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008542" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-867" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.