ID CVE-2018-10590
Summary In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an information exposure vulnerability through directory listing has been identified, which may allow an attacker to find important files that are not normally visible.
References
Vulnerable Configurations
  • cpe:2.3:a:advantech:webaccess:8.2_20170817
    cpe:2.3:a:advantech:webaccess:8.2_20170817
  • cpe:2.3:a:advantech:webaccess:8.3.0
    cpe:2.3:a:advantech:webaccess:8.3.0
  • cpe:2.3:a:advantech:webaccess_dashboard:2.0.15
    cpe:2.3:a:advantech:webaccess_dashboard:2.0.15
  • cpe:2.3:a:advantech:webaccess%2fnms:2.0.3
    cpe:2.3:a:advantech:webaccess%2fnms:2.0.3
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-538
CAPEC
  • Footprinting
    An attacker engages in probing and exploration activity to identify constituents and properties of the target. Footprinting is a general term to describe a variety of information gathering techniques, often used by attackers in preparation for some attack. It consists of using tools to learn as much as possible about the composition, configuration, and security mechanisms of the targeted application, system or network. Information that might be collected during a footprinting effort could include open ports, applications and their versions, network topology, and similar information. While footprinting is not intended to be damaging (although certain activities, such as network scans, can sometimes cause disruptions to vulnerable applications inadvertently) it may often pave the way for more damaging attacks.
  • WSDL Scanning
    This attack targets the WSDL interface made available by a web service. The attacker may scan the WSDL interface to reveal sensitive information about invocation patterns, underlying technology implementations and associated vulnerabilities. This type of probing is carried out to perform more serious attacks (e.g. parameter tampering, malicious content injection, command injection, etc.). WSDL files provide detailed information about the services ports and bindings available to consumers. For instance, the attacker can submit special characters or malicious content to the Web service and can cause a denial of service condition or illegal access to database records. In addition, the attacker may try to guess other private methods by using the information provided in the WSDL files.
refmap via4
bid 104190
misc https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01
Last major update 15-05-2018 - 18:29
Published 15-05-2018 - 18:29
Last modified 15-06-2018 - 15:01
Back to Top