All the vulnerabilites related to Advantech - WebAccess/SCADA
var-202011-1548
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1548", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58467" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-58467", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-58467", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58467" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58467" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58467", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58467" } ] }, "id": "VAR-202011-1548", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-58467" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58467" } ] }, "last_update_date": "2022-05-04T09:37:58.109000Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58467" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-58467" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-58467" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58467)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58467" } ], "trust": 0.6 } }
var-202103-0009
Vulnerability from variot
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Is vulnerable to incorrect default permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0009", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11307" }, { "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "db": "NVD", "id": "CVE-2020-13554" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Yuri Kramarz of Cisco Talos.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1264" } ], "trust": 0.6 }, "cve": "CVE-2020-13554", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2020-13554", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2021-11307", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-166344", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-13554", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "talos-cna@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-13554", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-13554", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-13554", "trust": 1.0, "value": "HIGH" }, { "author": "talos-cna@cisco.com", "id": "CVE-2020-13554", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-13554", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-11307", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202102-1264", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-166344", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11307" }, { "db": "VULHUB", "id": "VHN-166344" }, { "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "db": "CNNVD", "id": "CNNVD-202102-1264" }, { "db": "NVD", "id": "CVE-2020-13554" }, { "db": "NVD", "id": "CVE-2020-13554" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Is vulnerable to incorrect default permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2020-13554" }, { "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "db": "CNVD", "id": "CNVD-2021-11307" }, { "db": "VULHUB", "id": "VHN-166344" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "TALOS", "id": "TALOS-2020-1169", "trust": 3.1 }, { "db": "NVD", "id": "CVE-2020-13554", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-016164", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-11307", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202102-1264", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-166344", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11307" }, { "db": "VULHUB", "id": "VHN-166344" }, { "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "db": "CNNVD", "id": "CNNVD-202102-1264" }, { "db": "NVD", "id": "CVE-2020-13554" } ] }, "id": "VAR-202103-0009", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-11307" }, { "db": "VULHUB", "id": "VHN-166344" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11307" } ] }, "last_update_date": "2024-11-23T22:40:46.743000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.tw/support/details/installation?id=1-MS9MJV" }, { "title": "Multiple Advantech Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=143433" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "db": "CNNVD", "id": "CNNVD-202102-1264" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-166344" }, { "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "db": "NVD", "id": "CVE-2020-13554" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13554" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11307" }, { "db": "VULHUB", "id": "VHN-166344" }, { "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "db": "CNNVD", "id": "CNNVD-202102-1264" }, { "db": "NVD", "id": "CVE-2020-13554" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-11307" }, { "db": "VULHUB", "id": "VHN-166344" }, { "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "db": "CNNVD", "id": "CNNVD-202102-1264" }, { "db": "NVD", "id": "CVE-2020-13554" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11307" }, { "date": "2021-03-03T00:00:00", "db": "VULHUB", "id": "VHN-166344" }, { "date": "2021-11-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "date": "2021-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1264" }, { "date": "2021-03-03T17:15:11.487000", "db": "NVD", "id": "CVE-2020-13554" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-23T00:00:00", "db": "CNVD", "id": "CNVD-2021-11307" }, { "date": "2022-09-30T00:00:00", "db": "VULHUB", "id": "VHN-166344" }, { "date": "2021-11-11T08:23:00", "db": "JVNDB", "id": "JVNDB-2020-016164" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1264" }, { "date": "2024-11-21T05:01:29.170000", "db": "NVD", "id": "CVE-2020-13554" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1264" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0WebAccess/SCADA\u00a0 Inappropriate Default Permission Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016164" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1264" } ], "trust": 0.6 } }
var-202102-0023
Vulnerability from variot
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0023", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11306" }, { "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "db": "NVD", "id": "CVE-2020-13553" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Yuri Kramarz of Cisco Talos.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1260" } ], "trust": 0.6 }, "cve": "CVE-2020-13553", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2020-13553", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2021-11306", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-166343", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "talos-cna@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-13553", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-13553", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-13553", "trust": 1.0, "value": "HIGH" }, { "author": "talos-cna@cisco.com", "id": "CVE-2020-13553", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-13553", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-11306", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202102-1260", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-166343", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11306" }, { "db": "VULHUB", "id": "VHN-166343" }, { "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "db": "CNNVD", "id": "CNNVD-202102-1260" }, { "db": "NVD", "id": "CVE-2020-13553" }, { "db": "NVD", "id": "CVE-2020-13553" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2020-13553" }, { "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "db": "CNVD", "id": "CNVD-2021-11306" }, { "db": "VULHUB", "id": "VHN-166343" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-13553", "trust": 3.1 }, { "db": "TALOS", "id": "TALOS-2020-1169", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-016181", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-11306", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202102-1260", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-166343", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11306" }, { "db": "VULHUB", "id": "VHN-166343" }, { "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "db": "CNNVD", "id": "CNNVD-202102-1260" }, { "db": "NVD", "id": "CVE-2020-13553" } ] }, "id": "VAR-202102-0023", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-11306" }, { "db": "VULHUB", "id": "VHN-166343" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11306" } ] }, "last_update_date": "2024-11-23T22:40:46.713000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada" }, { "title": "Advantech WebAccess/SCADA Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142127" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "db": "CNNVD", "id": "CNNVD-202102-1260" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-166343" }, { "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "db": "NVD", "id": "CVE-2020-13553" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13553" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11306" }, { "db": "VULHUB", "id": "VHN-166343" }, { "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "db": "CNNVD", "id": "CNNVD-202102-1260" }, { "db": "NVD", "id": "CVE-2020-13553" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-11306" }, { "db": "VULHUB", "id": "VHN-166343" }, { "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "db": "CNNVD", "id": "CNNVD-202102-1260" }, { "db": "NVD", "id": "CVE-2020-13553" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11306" }, { "date": "2021-02-17T00:00:00", "db": "VULHUB", "id": "VHN-166343" }, { "date": "2021-11-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "date": "2021-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1260" }, { "date": "2021-02-17T19:15:12.510000", "db": "NVD", "id": "CVE-2020-13553" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11306" }, { "date": "2022-06-29T00:00:00", "db": "VULHUB", "id": "VHN-166343" }, { "date": "2021-11-12T01:08:00", "db": "JVNDB", "id": "JVNDB-2020-016181" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1260" }, { "date": "2024-11-21T05:01:29.047000", "db": "NVD", "id": "CVE-2020-13553" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1260" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0WebAccess/SCADA\u00a0 Vulnerability in privilege management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016181" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1260" } ], "trust": 0.6 } }
var-202011-1539
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1539", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58463" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-58463", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-58463", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58463" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58463" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58463", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58463" } ] }, "id": "VAR-202011-1539", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-58463" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58463" } ] }, "last_update_date": "2022-05-04T09:27:54.359000Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58463" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-58463" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-58463" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58463)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58463" } ], "trust": 0.6 } }
var-201904-0181
Vulnerability from variot
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwthinfl.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": null, "trust": 8.4, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 0.8, "vendor": "advantech", "version": "8.3.5 and less" }, { "_id": null, "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=8.3.5" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498" }, { "db": "ZDI", "id": "ZDI-19-322" }, { "db": "ZDI", "id": "ZDI-19-311" }, { "db": "ZDI", "id": "ZDI-19-329" }, { "db": "ZDI", "id": "ZDI-19-325" }, { "db": "ZDI", "id": "ZDI-19-313" }, { "db": "ZDI", "id": "ZDI-19-328" }, { "db": "ZDI", "id": "ZDI-19-318" }, { "db": "ZDI", "id": "ZDI-19-321" }, { "db": "ZDI", "id": "ZDI-19-330" }, { "db": "ZDI", "id": "ZDI-19-315" }, { "db": "ZDI", "id": "ZDI-19-323" }, { "db": "ZDI", "id": "ZDI-19-327" }, { "db": "CNVD", "id": "CNVD-2019-08948" }, { "db": "JVNDB", "id": "JVNDB-2019-003121" }, { "db": "NVD", "id": "CVE-2019-6550" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003121" } ] }, "credits": { "_id": null, "data": "Mat Powell of Trend Micro Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-19-322" }, { "db": "ZDI", "id": "ZDI-19-311" }, { "db": "ZDI", "id": "ZDI-19-329" }, { "db": "ZDI", "id": "ZDI-19-325" }, { "db": "ZDI", "id": "ZDI-19-313" }, { "db": "ZDI", "id": "ZDI-19-328" }, { "db": "ZDI", "id": "ZDI-19-318" }, { "db": "ZDI", "id": "ZDI-19-330" }, { "db": "ZDI", "id": "ZDI-19-315" }, { "db": "ZDI", "id": "ZDI-19-323" }, { "db": "ZDI", "id": "ZDI-19-327" } ], "trust": 7.7 }, "cve": "CVE-2019-6550", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-6550", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-08948", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-157985", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-6550", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 8.4, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-6550", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6550", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2019-6550", "trust": 8.4, "value": "CRITICAL" }, { "author": "nvd@nist.gov", "id": "CVE-2019-6550", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-6550", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-08948", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201904-089", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-157985", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-6550", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498" }, { "db": "ZDI", "id": "ZDI-19-322" }, { "db": "ZDI", "id": "ZDI-19-311" }, { "db": "ZDI", "id": "ZDI-19-329" }, { "db": "ZDI", "id": "ZDI-19-325" }, { "db": "ZDI", "id": "ZDI-19-313" }, { "db": "ZDI", "id": "ZDI-19-328" }, { "db": "ZDI", "id": "ZDI-19-318" }, { "db": "ZDI", "id": "ZDI-19-321" }, { "db": "ZDI", "id": "ZDI-19-330" }, { "db": "ZDI", "id": "ZDI-19-315" }, { "db": "ZDI", "id": "ZDI-19-323" }, { "db": "ZDI", "id": "ZDI-19-327" }, { "db": "CNVD", "id": "CNVD-2019-08948" }, { "db": "VULHUB", "id": "VHN-157985" }, { "db": "VULMON", "id": "CVE-2019-6550" }, { "db": "JVNDB", "id": "JVNDB-2019-003121" }, { "db": "CNNVD", "id": "CNNVD-201904-089" }, { "db": "NVD", "id": "CVE-2019-6550" } ] }, "description": { "_id": null, "data": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwthinfl.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations", "sources": [ { "db": "NVD", "id": "CVE-2019-6550" }, { "db": "JVNDB", "id": "JVNDB-2019-003121" }, { "db": "ZDI", "id": "ZDI-19-321" }, { "db": "ZDI", "id": "ZDI-19-327" }, { "db": "ZDI", "id": "ZDI-19-323" }, { "db": "ZDI", "id": "ZDI-19-315" }, { "db": "ZDI", "id": "ZDI-19-322" }, { "db": "ZDI", "id": "ZDI-19-330" }, { "db": "ZDI", "id": "ZDI-19-318" }, { "db": "ZDI", "id": "ZDI-19-328" }, { "db": "ZDI", "id": "ZDI-19-313" }, { "db": "ZDI", "id": "ZDI-19-325" }, { "db": "ZDI", "id": "ZDI-19-329" }, { "db": "ZDI", "id": "ZDI-19-311" }, { "db": "CNVD", "id": "CNVD-2019-08948" }, { "db": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498" }, { "db": "VULHUB", "id": "VHN-157985" }, { "db": "VULMON", "id": "CVE-2019-6550" } ], "trust": 10.08 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2019-6550", "trust": 11.8 }, { "db": "ICS CERT", "id": "ICSA-19-092-01", "trust": 3.2 }, { "db": "ZDI", "id": "ZDI-19-585", "trust": 1.8 }, { "db": "ZDI", "id": "ZDI-19-330", "trust": 1.3 }, { "db": "CNNVD", "id": "CNNVD-201904-089", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-08948", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-003121", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7914", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-322", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7899", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-311", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7924", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-329", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7927", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-325", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7901", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-313", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7882", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-328", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7910", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-318", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7920", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-321", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7930", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7903", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-315", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7925", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-323", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7881", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-327", "trust": 0.7 }, { "db": "BID", "id": "107675", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.1113", "trust": 0.6 }, { "db": "IVD", "id": "4D85A7A9-A091-4C59-84E6-73C8B6639498", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-157985", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-6550", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498" }, { "db": "ZDI", "id": "ZDI-19-322" }, { "db": "ZDI", "id": "ZDI-19-311" }, { "db": "ZDI", "id": "ZDI-19-329" }, { "db": "ZDI", "id": "ZDI-19-325" }, { "db": "ZDI", "id": "ZDI-19-313" }, { "db": "ZDI", "id": "ZDI-19-328" }, { "db": "ZDI", "id": "ZDI-19-318" }, { "db": "ZDI", "id": "ZDI-19-321" }, { "db": "ZDI", "id": "ZDI-19-330" }, { "db": "ZDI", "id": "ZDI-19-315" }, { "db": "ZDI", "id": "ZDI-19-323" }, { "db": "ZDI", "id": "ZDI-19-327" }, { "db": "CNVD", "id": "CNVD-2019-08948" }, { "db": "VULHUB", "id": "VHN-157985" }, { "db": "VULMON", "id": "CVE-2019-6550" }, { "db": "JVNDB", "id": "JVNDB-2019-003121" }, { "db": "CNNVD", "id": "CNNVD-201904-089" }, { "db": "NVD", "id": "CVE-2019-6550" } ] }, "id": "VAR-201904-0181", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498" }, { "db": "CNVD", "id": "CNVD-2019-08948" }, { "db": "VULHUB", "id": "VHN-157985" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498" }, { "db": "CNVD", "id": "CNVD-2019-08948" } ] }, "last_update_date": "2024-11-29T22:41:17.815000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 5.6, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" }, { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 2.8, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-091-01" }, { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/157945" }, { "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91013" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-322" }, { "db": "ZDI", "id": "ZDI-19-311" }, { "db": "ZDI", "id": "ZDI-19-329" }, { "db": "ZDI", "id": "ZDI-19-325" }, { "db": "ZDI", "id": "ZDI-19-313" }, { "db": "ZDI", "id": "ZDI-19-328" }, { "db": "ZDI", "id": "ZDI-19-318" }, { "db": "ZDI", "id": "ZDI-19-321" }, { "db": "ZDI", "id": "ZDI-19-330" }, { "db": "ZDI", "id": "ZDI-19-315" }, { "db": "ZDI", "id": "ZDI-19-323" }, { "db": "ZDI", "id": "ZDI-19-327" }, { "db": "CNVD", "id": "CNVD-2019-08948" }, { "db": "JVNDB", "id": "JVNDB-2019-003121" }, { "db": "CNNVD", "id": "CNNVD-201904-089" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157985" }, { "db": "JVNDB", "id": "JVNDB-2019-003121" }, { "db": "NVD", "id": "CVE-2019-6550" } ] }, "references": { "_id": null, "data": [ { "trust": 8.9, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01" }, { "trust": 2.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-091-01" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-585/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6550" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/107675" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6550" }, { "trust": 0.6, "url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download" }, { "trust": 0.6, "url": "https://www.advantech.com/" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-330/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78318" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-322" }, { "db": "ZDI", "id": "ZDI-19-311" }, { "db": "ZDI", "id": "ZDI-19-329" }, { "db": "ZDI", "id": "ZDI-19-325" }, { "db": "ZDI", "id": "ZDI-19-313" }, { "db": "ZDI", "id": "ZDI-19-328" }, { "db": "ZDI", "id": "ZDI-19-318" }, { "db": "ZDI", "id": "ZDI-19-321" }, { "db": "ZDI", "id": "ZDI-19-330" }, { "db": "ZDI", "id": "ZDI-19-315" }, { "db": "ZDI", "id": "ZDI-19-323" }, { "db": "ZDI", "id": "ZDI-19-327" }, { "db": "CNVD", "id": "CNVD-2019-08948" }, { "db": "VULHUB", "id": "VHN-157985" }, { "db": "VULMON", "id": "CVE-2019-6550" }, { "db": "JVNDB", "id": "JVNDB-2019-003121" }, { "db": "CNNVD", "id": "CNNVD-201904-089" }, { "db": "NVD", "id": "CVE-2019-6550" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498", "ident": null }, { "db": "ZDI", "id": "ZDI-19-322", "ident": null }, { "db": "ZDI", "id": "ZDI-19-311", "ident": null }, { "db": "ZDI", "id": "ZDI-19-329", "ident": null }, { "db": "ZDI", "id": "ZDI-19-325", "ident": null }, { "db": "ZDI", "id": "ZDI-19-313", "ident": null }, { "db": "ZDI", "id": "ZDI-19-328", "ident": null }, { "db": "ZDI", "id": "ZDI-19-318", "ident": null }, { "db": "ZDI", "id": "ZDI-19-321", "ident": null }, { "db": "ZDI", "id": "ZDI-19-330", "ident": null }, { "db": "ZDI", "id": "ZDI-19-315", "ident": null }, { "db": "ZDI", "id": "ZDI-19-323", "ident": null }, { "db": "ZDI", "id": "ZDI-19-327", "ident": null }, { "db": "CNVD", "id": "CNVD-2019-08948", "ident": null }, { "db": "VULHUB", "id": "VHN-157985", "ident": null }, { "db": "VULMON", "id": "CVE-2019-6550", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2019-003121", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201904-089", "ident": null }, { "db": "NVD", "id": "CVE-2019-6550", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2019-04-03T00:00:00", "db": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-322", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-311", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-329", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-325", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-313", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-328", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-318", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-321", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-330", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-315", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-323", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-327", "ident": null }, { "date": "2019-04-03T00:00:00", "db": "CNVD", "id": "CNVD-2019-08948", "ident": null }, { "date": "2019-04-05T00:00:00", "db": "VULHUB", "id": "VHN-157985", "ident": null }, { "date": "2019-04-05T00:00:00", "db": "VULMON", "id": "CVE-2019-6550", "ident": null }, { "date": "2019-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003121", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-089", "ident": null }, { "date": "2019-04-05T19:29:00.310000", "db": "NVD", "id": "CVE-2019-6550", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-322", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-311", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-329", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-325", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-313", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-328", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-318", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-321", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-330", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-315", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-323", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-327", "ident": null }, { "date": "2019-04-03T00:00:00", "db": "CNVD", "id": "CNVD-2019-08948", "ident": null }, { "date": "2020-10-06T00:00:00", "db": "VULHUB", "id": "VHN-157985", "ident": null }, { "date": "2020-10-06T00:00:00", "db": "VULMON", "id": "CVE-2019-6550", "ident": null }, { "date": "2019-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003121", "ident": null }, { "date": "2020-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-089", "ident": null }, { "date": "2024-11-21T04:46:40.660000", "db": "NVD", "id": "CVE-2019-6550", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-089" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess Node bwthinfl Stack-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-19-328" }, { "db": "ZDI", "id": "ZDI-19-321" } ], "trust": 1.4 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "4d85a7a9-a091-4c59-84e6-73c8b6639498" }, { "db": "CNNVD", "id": "CNNVD-201904-089" } ], "trust": 0.8 } }
var-202102-0294
Vulnerability from variot
The WADashboard component of WebAccess/SCADA Versions 9.0 and prior may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the WADashboard component. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are security vulnerabilities in WebAccess/SCADA WADashboard version 9.0 and earlier versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0294", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "advantech", "version": "version 9.0" }, { "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null }, { "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=9.0" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1261" }, { "db": "CNVD", "id": "CNVD-2021-11309" }, { "db": "JVNDB", "id": "JVNDB-2020-009106" }, { "db": "NVD", "id": "CVE-2020-25161" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009106" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sivathmican Sivakumaran", "sources": [ { "db": "ZDI", "id": "ZDI-20-1261" } ], "trust": 0.7 }, "cve": "CVE-2020-25161", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2020-25161", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2021-11309", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-179112", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-25161", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA score", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-009106", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-25161", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-25161", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2020-009106", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-25161", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2021-11309", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202010-700", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-179112", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1261" }, { "db": "CNVD", "id": "CNVD-2021-11309" }, { "db": "VULHUB", "id": "VHN-179112" }, { "db": "JVNDB", "id": "JVNDB-2020-009106" }, { "db": "CNNVD", "id": "CNNVD-202010-700" }, { "db": "NVD", "id": "CVE-2020-25161" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WADashboard component of WebAccess/SCADA Versions 9.0 and prior may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the WADashboard component. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are security vulnerabilities in WebAccess/SCADA WADashboard version 9.0 and earlier versions", "sources": [ { "db": "NVD", "id": "CVE-2020-25161" }, { "db": "JVNDB", "id": "JVNDB-2020-009106" }, { "db": "ZDI", "id": "ZDI-20-1261" }, { "db": "CNVD", "id": "CNVD-2021-11309" }, { "db": "VULHUB", "id": "VHN-179112" }, { "db": "VULMON", "id": "CVE-2020-25161" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-25161", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-20-289-01", "trust": 3.1 }, { "db": "JVN", "id": "JVNVU97695305", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-009106", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11262", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-1261", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202010-700", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2021-11309", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3584", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-98405", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-179112", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-25161", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1261" }, { "db": "CNVD", "id": "CNVD-2021-11309" }, { "db": "VULHUB", "id": "VHN-179112" }, { "db": "VULMON", "id": "CVE-2020-25161" }, { "db": "JVNDB", "id": "JVNDB-2020-009106" }, { "db": "CNNVD", "id": "CNNVD-202010-700" }, { "db": "NVD", "id": "CVE-2020-25161" } ] }, "id": "VAR-202102-0294", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-11309" }, { "db": "VULHUB", "id": "VHN-179112" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11309" } ] }, "last_update_date": "2024-11-23T22:25:21.556000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA Release Notes", "trust": 0.8, "url": "https://www.advantech.com/support/details/manual?id=1-1J6QG9J" }, { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-289-01" }, { "title": "Patch for Advantech WebAccess/SCADA path manipulation code execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/248501" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1261" }, { "db": "CNVD", "id": "CNVD-2021-11309" }, { "db": "JVNDB", "id": "JVNDB-2020-009106" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-610", "trust": 1.1 }, { "problemtype": "CWE-73", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-179112" }, { "db": "NVD", "id": "CVE-2020-25161" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-289-01" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-25161" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu97695305" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25161" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3584/" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189888" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1261" }, { "db": "CNVD", "id": "CNVD-2021-11309" }, { "db": "VULHUB", "id": "VHN-179112" }, { "db": "VULMON", "id": "CVE-2020-25161" }, { "db": "JVNDB", "id": "JVNDB-2020-009106" }, { "db": "CNNVD", "id": "CNNVD-202010-700" }, { "db": "NVD", "id": "CVE-2020-25161" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-1261" }, { "db": "CNVD", "id": "CNVD-2021-11309" }, { "db": "VULHUB", "id": "VHN-179112" }, { "db": "VULMON", "id": "CVE-2020-25161" }, { "db": "JVNDB", "id": "JVNDB-2020-009106" }, { "db": "CNNVD", "id": "CNNVD-202010-700" }, { "db": "NVD", "id": "CVE-2020-25161" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-19T00:00:00", "db": "ZDI", "id": "ZDI-20-1261" }, { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11309" }, { "date": "2021-02-23T00:00:00", "db": "VULHUB", "id": "VHN-179112" }, { "date": "2021-02-23T00:00:00", "db": "VULMON", "id": "CVE-2020-25161" }, { "date": "2020-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-009106" }, { "date": "2020-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202010-700" }, { "date": "2021-02-23T17:15:13.270000", "db": "NVD", "id": "CVE-2020-25161" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-19T00:00:00", "db": "ZDI", "id": "ZDI-20-1261" }, { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11309" }, { "date": "2021-02-27T00:00:00", "db": "VULHUB", "id": "VHN-179112" }, { "date": "2021-02-27T00:00:00", "db": "VULMON", "id": "CVE-2020-25161" }, { "date": "2020-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-009106" }, { "date": "2021-03-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202010-700" }, { "date": "2024-11-21T05:17:30.647000", "db": "NVD", "id": "CVE-2020-25161" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-700" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech Made WebAccess/SCADA Filename and pathname external control vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009106" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-700" } ], "trust": 0.6 } }
var-202008-1272
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1272", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48616" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2020-48616", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48616", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48616" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48616" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48616", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48616" } ] }, "id": "VAR-202008-1272", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48616" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48616" } ] }, "last_update_date": "2022-05-04T10:15:04.588000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control WshShell class run member has command execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225709" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48616" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48616" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48616" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48616" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-48616)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48616" } ], "trust": 0.6 } }
var-201904-0334
Vulnerability from variot
Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOCTL 10005 RPC. Advantech WebAccess Contains an access control vulnerability.Information may be tampered with. Advantech WebAccess is a browser-based HMI/SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. An arbitrary file-download vulnerability 2. An arbitrary file-upload vulnerability An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files and perform certain unauthorized actions. This may aid in further attacks. Advantech WebAccess 8.3.4 is vulnerable; other versions may also be affected. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0334", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess", "scope": "eq", "trust": 2.4, "vendor": "advantech", "version": "8.3.4" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "8.3.4" } ], "sources": [ { "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "db": "CNVD", "id": "CNVD-2019-32475" }, { "db": "BID", "id": "107847" }, { "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "db": "NVD", "id": "CVE-2019-3941" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003250" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tenable", "sources": [ { "db": "BID", "id": "107847" }, { "db": "CNNVD", "id": "CNNVD-201904-479" } ], "trust": 0.9 }, "cve": "CVE-2019-3941", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-3941", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-32475", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-155376", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-3941", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-3941", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-3941", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2019-32475", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201904-479", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-155376", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "db": "CNVD", "id": "CNVD-2019-32475" }, { "db": "VULHUB", "id": "VHN-155376" }, { "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "db": "CNNVD", "id": "CNNVD-201904-479" }, { "db": "NVD", "id": "CVE-2019-3941" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOCTL 10005 RPC. Advantech WebAccess Contains an access control vulnerability.Information may be tampered with. Advantech WebAccess is a browser-based HMI/SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:\n1. An arbitrary file-download vulnerability\n2. An arbitrary file-upload vulnerability\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files and perform certain unauthorized actions. This may aid in further attacks. \nAdvantech WebAccess 8.3.4 is vulnerable; other versions may also be affected. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles", "sources": [ { "db": "NVD", "id": "CVE-2019-3941" }, { "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "db": "CNVD", "id": "CNVD-2019-32475" }, { "db": "BID", "id": "107847" }, { "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "db": "VULHUB", "id": "VHN-155376" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-3941", "trust": 3.6 }, { "db": "TENABLE", "id": "TRA-2019-15", "trust": 3.4 }, { "db": "BID", "id": "107847", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201904-479", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32475", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-003250", "trust": 0.8 }, { "db": "IVD", "id": "977C7FA4-F2FA-4903-84F3-E97660225D1F", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-155376", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "db": "CNVD", "id": "CNVD-2019-32475" }, { "db": "VULHUB", "id": "VHN-155376" }, { "db": "BID", "id": "107847" }, { "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "db": "CNNVD", "id": "CNNVD-201904-479" }, { "db": "NVD", "id": "CVE-2019-3941" } ] }, "id": "VAR-201904-0334", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "db": "CNVD", "id": "CNVD-2019-32475" }, { "db": "VULHUB", "id": "VHN-155376" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "db": "CNVD", "id": "CNVD-2019-32475" } ] }, "last_update_date": "2024-11-23T22:12:06.897000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Advantech WebAccess Access Control Error Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181483" }, { "title": "Advantech WebAccess Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91306" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32475" }, { "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "db": "CNNVD", "id": "CNNVD-201904-479" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "CWE-284", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-155376" }, { "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "db": "NVD", "id": "CVE-2019-3941" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://www.tenable.com/security/research/tra-2019-15" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/107847" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3941" }, { "trust": 0.9, "url": "http://webaccess.advantech.com" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3941" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32475" }, { "db": "VULHUB", "id": "VHN-155376" }, { "db": "BID", "id": "107847" }, { "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "db": "CNNVD", "id": "CNNVD-201904-479" }, { "db": "NVD", "id": "CVE-2019-3941" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "db": "CNVD", "id": "CNVD-2019-32475" }, { "db": "VULHUB", "id": "VHN-155376" }, { "db": "BID", "id": "107847" }, { "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "db": "CNNVD", "id": "CNNVD-201904-479" }, { "db": "NVD", "id": "CVE-2019-3941" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32475" }, { "date": "2019-04-09T00:00:00", "db": "VULHUB", "id": "VHN-155376" }, { "date": "2019-04-03T00:00:00", "db": "BID", "id": "107847" }, { "date": "2019-05-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "date": "2019-04-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-479" }, { "date": "2019-04-09T16:29:02.147000", "db": "NVD", "id": "CVE-2019-3941" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32475" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-155376" }, { "date": "2019-04-03T00:00:00", "db": "BID", "id": "107847" }, { "date": "2019-05-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003250" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-479" }, { "date": "2024-11-21T04:42:54.673000", "db": "NVD", "id": "CVE-2019-3941" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-479" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess Access Control Error Vulnerability", "sources": [ { "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "db": "CNVD", "id": "CNVD-2019-32475" }, { "db": "CNNVD", "id": "CNNVD-201904-479" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Access control error", "sources": [ { "db": "IVD", "id": "977c7fa4-f2fa-4903-84f3-e97660225d1f" }, { "db": "CNNVD", "id": "CNNVD-201904-479" } ], "trust": 0.8 } }
var-202005-0311
Vulnerability from variot
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An improper validation vulnerability exists that could allow an attacker to inject specially crafted input into memory where it can be executed. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000521e in DATACORE.exe. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": "eq", "trust": 1.9, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 0.9, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess node", "scope": "gte", "trust": 0.6, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "9.0.0" } ], "sources": [ { "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d" }, { "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404" }, { "db": "ZDI", "id": "ZDI-20-598" }, { "db": "CNVD", "id": "CNVD-2020-27432" }, { "db": "VULMON", "id": "CVE-2020-12022" }, { "db": "JVNDB", "id": "JVNDB-2020-005146" }, { "db": "NVD", "id": "CVE-2020-12022" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005146" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-598" } ], "trust": 0.7 }, "cve": "CVE-2020-12022", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-12022", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005146", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-27432", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "19380447-9612-4180-8a2e-efbd7ba08404", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-164659", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12022", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005146", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12022", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12022", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-005146", "trust": 0.8, "value": "Critical" }, { "author": "ZDI", "id": "CVE-2020-12022", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2020-27432", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202005-313", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-164659", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-12022", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d" }, { "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404" }, { "db": "ZDI", "id": "ZDI-20-598" }, { "db": "CNVD", "id": "CNVD-2020-27432" }, { "db": "VULHUB", "id": "VHN-164659" }, { "db": "VULMON", "id": "CVE-2020-12022" }, { "db": "JVNDB", "id": "JVNDB-2020-005146" }, { "db": "CNNVD", "id": "CNNVD-202005-313" }, { "db": "NVD", "id": "CVE-2020-12022" } ] }, "description": { "_id": null, "data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An improper validation vulnerability exists that could allow an attacker to inject specially crafted input into memory where it can be executed. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000521e in DATACORE.exe. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required", "sources": [ { "db": "NVD", "id": "CVE-2020-12022" }, { "db": "JVNDB", "id": "JVNDB-2020-005146" }, { "db": "ZDI", "id": "ZDI-20-598" }, { "db": "CNVD", "id": "CNVD-2020-27432" }, { "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d" }, { "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404" }, { "db": "VULHUB", "id": "VHN-164659" }, { "db": "VULMON", "id": "CVE-2020-12022" } ], "trust": 3.33 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-12022", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-20-128-01", "trust": 3.2 }, { "db": "ZDI", "id": "ZDI-20-598", "trust": 2.5 }, { "db": "CNVD", "id": "CNVD-2020-27432", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-202005-313", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU93292753", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005146", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9988", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1646", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47693", "trust": 0.6 }, { "db": "IVD", "id": "6265122D-0D35-44B3-85EA-0C5F7B711A0D", "trust": 0.2 }, { "db": "IVD", "id": "19380447-9612-4180-8A2E-EFBD7BA08404", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-164659", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-12022", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d" }, { "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404" }, { "db": "ZDI", "id": "ZDI-20-598" }, { "db": "CNVD", "id": "CNVD-2020-27432" }, { "db": "VULHUB", "id": "VHN-164659" }, { "db": "VULMON", "id": "CVE-2020-12022" }, { "db": "JVNDB", "id": "JVNDB-2020-005146" }, { "db": "CNNVD", "id": "CNNVD-202005-313" }, { "db": "NVD", "id": "CVE-2020-12022" } ] }, "id": "VAR-202005-0311", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d" }, { "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404" }, { "db": "CNVD", "id": "CNVD-2020-27432" }, { "db": "VULHUB", "id": "VHN-164659" } ], "trust": 1.679503486666667 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d" }, { "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404" }, { "db": "CNVD", "id": "CNVD-2020-27432" } ] }, "last_update_date": "2024-11-23T21:59:18.540000Z", "patch": { "_id": null, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.advantech.com/" }, { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "title": "Patch for Advantech WebAccess Node input validation error vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/218857" }, { "title": "Advantech WebAccess Node Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=118220" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-598" }, { "db": "CNVD", "id": "CNVD-2020-27432" }, { "db": "JVNDB", "id": "JVNDB-2020-005146" }, { "db": "CNNVD", "id": "CNNVD-202005-313" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-129", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-164659" }, { "db": "JVNDB", "id": "JVNDB-2020-005146" }, { "db": "NVD", "id": "CVE-2020-12022" } ] }, "references": { "_id": null, "data": [ { "trust": 3.2, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-598/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12022" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12022" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93292753/" }, { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1646/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47693" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/129.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181602" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-598" }, { "db": "CNVD", "id": "CNVD-2020-27432" }, { "db": "VULHUB", "id": "VHN-164659" }, { "db": "VULMON", "id": "CVE-2020-12022" }, { "db": "JVNDB", "id": "JVNDB-2020-005146" }, { "db": "CNNVD", "id": "CNNVD-202005-313" }, { "db": "NVD", "id": "CVE-2020-12022" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d", "ident": null }, { "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404", "ident": null }, { "db": "ZDI", "id": "ZDI-20-598", "ident": null }, { "db": "CNVD", "id": "CNVD-2020-27432", "ident": null }, { "db": "VULHUB", "id": "VHN-164659", "ident": null }, { "db": "VULMON", "id": "CVE-2020-12022", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2020-005146", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202005-313", "ident": null }, { "db": "NVD", "id": "CVE-2020-12022", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-598", "ident": null }, { "date": "2020-05-09T00:00:00", "db": "CNVD", "id": "CNVD-2020-27432", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULHUB", "id": "VHN-164659", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULMON", "id": "CVE-2020-12022", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005146", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-313", "ident": null }, { "date": "2020-05-08T12:15:11.363000", "db": "NVD", "id": "CVE-2020-12022", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-598", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-27432", "ident": null }, { "date": "2020-05-11T00:00:00", "db": "VULHUB", "id": "VHN-164659", "ident": null }, { "date": "2020-05-11T00:00:00", "db": "VULMON", "id": "CVE-2020-12022", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005146", "ident": null }, { "date": "2020-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-313", "ident": null }, { "date": "2024-11-21T04:59:07.913000", "db": "NVD", "id": "CVE-2020-12022", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-313" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess Node Input validation error vulnerability", "sources": [ { "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d" }, { "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404" }, { "db": "CNVD", "id": "CNVD-2020-27432" }, { "db": "CNNVD", "id": "CNNVD-202005-313" } ], "trust": 1.6 }, "type": { "_id": null, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "6265122d-0d35-44b3-85ea-0c5f7b711a0d" }, { "db": "IVD", "id": "19380447-9612-4180-8a2e-efbd7ba08404" }, { "db": "CNNVD", "id": "CNNVD-202005-313" } ], "trust": 1.0 } }
var-202103-0910
Vulnerability from variot
WebAccess/SCADA Versions 9.0 and prior is vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment.
Advantech WebAccess/SCADA 9.0 and earlier versions have cross-site scripting vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0910", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "9.0" }, { "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-27809" }, { "db": "NVD", "id": "CVE-2021-27436" } ] }, "cve": "CVE-2021-27436", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-27436", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2021-27809", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-386703", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2021-27436", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-27436", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2021-27809", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202103-1019", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-386703", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-27436", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-27809" }, { "db": "VULHUB", "id": "VHN-386703" }, { "db": "VULMON", "id": "CVE-2021-27436" }, { "db": "CNNVD", "id": "CNNVD-202103-1019" }, { "db": "NVD", "id": "CVE-2021-27436" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA Versions 9.0 and prior is vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user\u2019s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. \n\r\n\r\nAdvantech WebAccess/SCADA 9.0 and earlier versions have cross-site scripting vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-27436" }, { "db": "CNVD", "id": "CNVD-2021-27809" }, { "db": "VULHUB", "id": "VHN-386703" }, { "db": "VULMON", "id": "CVE-2021-27436" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSA-21-075-01", "trust": 2.4 }, { "db": "NVD", "id": "CVE-2021-27436", "trust": 2.4 }, { "db": "CNNVD", "id": "CNNVD-202103-1019", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2021-27809", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0939", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-386703", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-27436", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-27809" }, { "db": "VULHUB", "id": "VHN-386703" }, { "db": "VULMON", "id": "CVE-2021-27436" }, { "db": "CNNVD", "id": "CNNVD-202103-1019" }, { "db": "NVD", "id": "CVE-2021-27436" } ] }, "id": "VAR-202103-0910", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-27809" }, { "db": "VULHUB", "id": "VHN-386703" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-27809" } ] }, "last_update_date": "2024-11-23T22:40:42.451000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Advantech WebAccess/SCADA cross-site scripting vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/257466" }, { "title": "Advantech Advantech WebAccess/SCADA Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=145471" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-27809" }, { "db": "CNNVD", "id": "CNNVD-202103-1019" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-386703" }, { "db": "NVD", "id": "CVE-2021-27436" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-075-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0939" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27436" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-27809" }, { "db": "VULHUB", "id": "VHN-386703" }, { "db": "VULMON", "id": "CVE-2021-27436" }, { "db": "CNNVD", "id": "CNNVD-202103-1019" }, { "db": "NVD", "id": "CVE-2021-27436" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-27809" }, { "db": "VULHUB", "id": "VHN-386703" }, { "db": "VULMON", "id": "CVE-2021-27436" }, { "db": "CNNVD", "id": "CNNVD-202103-1019" }, { "db": "NVD", "id": "CVE-2021-27436" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-11T00:00:00", "db": "CNVD", "id": "CNVD-2021-27809" }, { "date": "2021-03-18T00:00:00", "db": "VULHUB", "id": "VHN-386703" }, { "date": "2021-03-18T00:00:00", "db": "VULMON", "id": "CVE-2021-27436" }, { "date": "2021-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-1019" }, { "date": "2021-03-18T22:15:13.617000", "db": "NVD", "id": "CVE-2021-27436" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-27809" }, { "date": "2021-03-25T00:00:00", "db": "VULHUB", "id": "VHN-386703" }, { "date": "2021-03-25T00:00:00", "db": "VULMON", "id": "CVE-2021-27436" }, { "date": "2021-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-1019" }, { "date": "2024-11-21T05:57:59.240000", "db": "NVD", "id": "CVE-2021-27436" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-1019" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA cross-site scripting vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2021-27809" }, { "db": "CNNVD", "id": "CNNVD-202103-1019" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-1019" } ], "trust": 0.6 } }
var-202011-1558
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1558", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58466" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-58466", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-58466", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58466" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58466" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58466", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58466" } ] }, "id": "VAR-202011-1558", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-58466" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58466" } ] }, "last_update_date": "2022-05-04T08:52:25.592000Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58466" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-58466" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-58466" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58466)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58466" } ], "trust": 0.6 } }
var-202005-1242
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x521B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-611" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-611" } ], "trust": 0.7 }, "cvss": { "_id": null, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "ZDI-20-611", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-611", "trust": 0.7, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-611" } ] }, "description": { "_id": null, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x521B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.", "sources": [ { "db": "ZDI", "id": "ZDI-20-611" } ], "trust": 0.7 }, "external_ids": { "_id": null, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-9947", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-611", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-611" } ] }, "id": "VAR-202005-1242", "iot": { "_id": null, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6405517 }, "last_update_date": "2022-05-17T01:45:05.751000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-611" } ] }, "references": { "_id": null, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-611" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-20-611", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-611", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-611", "ident": null } ] }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA DATACORE IOCTL 0x521B Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-611" } ], "trust": 0.7 } }
var-201902-0122
Vulnerability from variot
WebAccess/SCADA, Version 8.3. An improper authentication vulnerability exists that could allow a possible authentication bypass allowing an attacker to upload malicious data. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. An SQL-injection vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201902-0122", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 1.7, "vendor": "advantech", "version": "8.3" }, { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "8.3" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess scada", "version": "8.3" } ], "sources": [ { "db": "IVD", "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff" }, { "db": "CNVD", "id": "CNVD-2019-32480" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001596" }, { "db": "NVD", "id": "CVE-2019-6519" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001596" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Devesh Logendran from Attila Cybertech Pte. Ltd.", "sources": [ { "db": "BID", "id": "106722" }, { "db": "CNNVD", "id": "CNNVD-201901-888" } ], "trust": 0.9 }, "cve": "CVE-2019-6519", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-6519", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-32480", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-157954", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-6519", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6519", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-6519", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-32480", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201901-888", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-157954", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff" }, { "db": "CNVD", "id": "CNVD-2019-32480" }, { "db": "VULHUB", "id": "VHN-157954" }, { "db": "JVNDB", "id": "JVNDB-2019-001596" }, { "db": "CNNVD", "id": "CNNVD-201901-888" }, { "db": "NVD", "id": "CVE-2019-6519" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA, Version 8.3. An improper authentication vulnerability exists that could allow a possible authentication bypass allowing an attacker to upload malicious data. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple authentication-bypass vulnerabilities\n2. An SQL-injection vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database", "sources": [ { "db": "NVD", "id": "CVE-2019-6519" }, { "db": "JVNDB", "id": "JVNDB-2019-001596" }, { "db": "CNVD", "id": "CNVD-2019-32480" }, { "db": "BID", "id": "106722" }, { "db": "IVD", "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff" }, { "db": "VULHUB", "id": "VHN-157954" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6519", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-19-024-01", "trust": 2.8 }, { "db": "BID", "id": "106722", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201901-888", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32480", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-001596", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-19-024-01T", "trust": 0.6 }, { "db": "IVD", "id": "3889E774-ABCC-4EE1-BF6B-535A4FBA4CFF", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-157954", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff" }, { "db": "CNVD", "id": "CNVD-2019-32480" }, { "db": "VULHUB", "id": "VHN-157954" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001596" }, { "db": "CNNVD", "id": "CNNVD-201901-888" }, { "db": "NVD", "id": "CVE-2019-6519" } ] }, "id": "VAR-201902-0122", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff" }, { "db": "CNVD", "id": "CNVD-2019-32480" }, { "db": "VULHUB", "id": "VHN-157954" } ], "trust": 1.5586422 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff" }, { "db": "CNVD", "id": "CNVD-2019-32480" } ] }, "last_update_date": "2024-11-23T22:37:55.518000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.advantech.com/" }, { "title": "Patch for Advantech WebAccess/SCADA Authorization Issue Vulnerability (CNVD-2019-32480)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181479" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32480" }, { "db": "JVNDB", "id": "JVNDB-2019-001596" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157954" }, { "db": "JVNDB", "id": "JVNDB-2019-001596" }, { "db": "NVD", "id": "CVE-2019-6519" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/106722" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6519" }, { "trust": 0.9, "url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6519" }, { "trust": 0.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01third party advisoryus government resource" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/106722third party advisoryvdb entry" }, { "trust": 0.3, "url": "https://www.advantech.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32480" }, { "db": "VULHUB", "id": "VHN-157954" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001596" }, { "db": "CNNVD", "id": "CNNVD-201901-888" }, { "db": "NVD", "id": "CVE-2019-6519" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff" }, { "db": "CNVD", "id": "CNVD-2019-32480" }, { "db": "VULHUB", "id": "VHN-157954" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001596" }, { "db": "CNNVD", "id": "CNNVD-201901-888" }, { "db": "NVD", "id": "CVE-2019-6519" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32480" }, { "date": "2019-02-05T00:00:00", "db": "VULHUB", "id": "VHN-157954" }, { "date": "2019-01-24T00:00:00", "db": "BID", "id": "106722" }, { "date": "2019-03-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001596" }, { "date": "2019-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-888" }, { "date": "2019-02-05T21:29:00.737000", "db": "NVD", "id": "CVE-2019-6519" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32480" }, { "date": "2019-02-06T00:00:00", "db": "VULHUB", "id": "VHN-157954" }, { "date": "2019-01-24T00:00:00", "db": "BID", "id": "106722" }, { "date": "2019-03-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001596" }, { "date": "2019-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-888" }, { "date": "2024-11-21T04:46:36.913000", "db": "NVD", "id": "CVE-2019-6519" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-888" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA Authentication vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001596" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-888" } ], "trust": 0.6 } }
var-202005-1239
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5217 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202005-1239", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-629" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-629" } ], "trust": 0.7 }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "ZDI-20-629", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-629", "trust": 0.7, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-629" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5217 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.", "sources": [ { "db": "ZDI", "id": "ZDI-20-629" } ], "trust": 0.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-9940", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-629", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-629" } ] }, "id": "VAR-202005-1239", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6405517 }, "last_update_date": "2022-05-17T02:01:01.019000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-629" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-629" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-629" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-629" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-629" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA DATACORE IOCTL 0x5217 Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-629" } ], "trust": 0.7 } }
var-201906-1026
Vulnerability from variot
In WebAccess/SCADA Versions 8.3.5 and prior, multiple out-of-bounds write vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. WebAccess/SCADA Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwdraw.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. Multiple heap-based buffer-overflow vulnerabilities 4. An information disclosure vulnerability 5. Multiple remote-code execution vulnerabilities An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (â??../â??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. Advantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. The vulnerability stems from the fact that the program does not correctly verify the length of the data provided by the user
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1026", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess", "scope": "lte", "trust": 1.8, "vendor": "advantech", "version": "8.3.5" }, { "model": "webaccess", "scope": null, "trust": 1.4, "vendor": "advantech", "version": null }, { "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=8.3.5" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.0" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "7.2" }, { "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.4.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884" }, { "db": "ZDI", "id": "ZDI-19-584" }, { "db": "ZDI", "id": "ZDI-19-587" }, { "db": "CNVD", "id": "CNVD-2019-32471" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "db": "NVD", "id": "CVE-2019-10987" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005815" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mat Powell of Trend Micro Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-19-584" } ], "trust": 0.7 }, "cve": "CVE-2019-10987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-10987", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2019-32471", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-142588", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-10987", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-10987", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-10987", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-10987", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-10987", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-10987", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2019-10987", "trust": 0.7, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2019-10987", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-32471", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-1076", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-142588", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884" }, { "db": "ZDI", "id": "ZDI-19-584" }, { "db": "ZDI", "id": "ZDI-19-587" }, { "db": "CNVD", "id": "CNVD-2019-32471" }, { "db": "VULHUB", "id": "VHN-142588" }, { "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "db": "CNNVD", "id": "CNNVD-201906-1076" }, { "db": "NVD", "id": "CVE-2019-10987" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In WebAccess/SCADA Versions 8.3.5 and prior, multiple out-of-bounds write vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. WebAccess/SCADA Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwdraw.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities:\n1. A directory-traversal vulnerability\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. Multiple heap-based buffer-overflow vulnerabilities\n4. An information disclosure vulnerability\n5. Multiple remote-code execution vulnerabilities\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (\u00e2??../\u00e2??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. \nAdvantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. The vulnerability stems from the fact that the program does not correctly verify the length of the data provided by the user", "sources": [ { "db": "NVD", "id": "CVE-2019-10987" }, { "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "db": "ZDI", "id": "ZDI-19-584" }, { "db": "ZDI", "id": "ZDI-19-587" }, { "db": "CNVD", "id": "CNVD-2019-32471" }, { "db": "BID", "id": "108923" }, { "db": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884" }, { "db": "VULHUB", "id": "VHN-142588" } ], "trust": 3.96 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-10987", "trust": 5.0 }, { "db": "ICS CERT", "id": "ICSA-19-178-05", "trust": 2.8 }, { "db": "ZDI", "id": "ZDI-19-584", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-19-587", "trust": 2.4 }, { "db": "BID", "id": "108923", "trust": 1.5 }, { "db": "CNNVD", "id": "CNNVD-201906-1076", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32471", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-005815", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7438", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7952", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2350", "trust": 0.6 }, { "db": "IVD", "id": "2AED5DF4-3281-48D2-B87E-B8691B4A4884", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-142588", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884" }, { "db": "ZDI", "id": "ZDI-19-584" }, { "db": "ZDI", "id": "ZDI-19-587" }, { "db": "CNVD", "id": "CNVD-2019-32471" }, { "db": "VULHUB", "id": "VHN-142588" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "db": "CNNVD", "id": "CNNVD-201906-1076" }, { "db": "NVD", "id": "CVE-2019-10987" } ] }, "id": "VAR-201906-1026", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884" }, { "db": "CNVD", "id": "CNVD-2019-32471" }, { "db": "VULHUB", "id": "VHN-142588" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884" }, { "db": "CNVD", "id": "CNVD-2019-32471" } ] }, "last_update_date": "2024-11-23T21:52:09.553000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Advantech WebAccess/SCADA patch for out-of-bounds write vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181491" }, { "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94179" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-584" }, { "db": "ZDI", "id": "ZDI-19-587" }, { "db": "CNVD", "id": "CNVD-2019-32471" }, { "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "db": "CNNVD", "id": "CNNVD-201906-1076" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142588" }, { "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "db": "NVD", "id": "CVE-2019-10987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 4.2, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-587/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-584/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10987" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/108923" }, { "trust": 0.9, "url": "http://webaccess.advantech.com" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10987" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2350/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-584" }, { "db": "ZDI", "id": "ZDI-19-587" }, { "db": "CNVD", "id": "CNVD-2019-32471" }, { "db": "VULHUB", "id": "VHN-142588" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "db": "CNNVD", "id": "CNNVD-201906-1076" }, { "db": "NVD", "id": "CVE-2019-10987" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884" }, { "db": "ZDI", "id": "ZDI-19-584" }, { "db": "ZDI", "id": "ZDI-19-587" }, { "db": "CNVD", "id": "CNVD-2019-32471" }, { "db": "VULHUB", "id": "VHN-142588" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "db": "CNNVD", "id": "CNNVD-201906-1076" }, { "db": "NVD", "id": "CVE-2019-10987" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884" }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-584" }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-587" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32471" }, { "date": "2019-06-28T00:00:00", "db": "VULHUB", "id": "VHN-142588" }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923" }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "date": "2019-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1076" }, { "date": "2019-06-28T21:15:11.180000", "db": "NVD", "id": "CVE-2019-10987" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-584" }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-587" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32471" }, { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-142588" }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923" }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005815" }, { "date": "2019-07-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1076" }, { "date": "2024-11-21T04:20:18.040000", "db": "NVD", "id": "CVE-2019-10987" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-1076" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005815" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "2aed5df4-3281-48d2-b87e-b8691b4a4884" }, { "db": "CNNVD", "id": "CNNVD-201906-1076" } ], "trust": 0.8 } }
var-202005-1243
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5218 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-612" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-612" } ], "trust": 0.7 }, "cvss": { "_id": null, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "ZDI-20-612", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-612", "trust": 0.7, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-612" } ] }, "description": { "_id": null, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5218 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.", "sources": [ { "db": "ZDI", "id": "ZDI-20-612" } ], "trust": 0.7 }, "external_ids": { "_id": null, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-9948", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-612", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-612" } ] }, "id": "VAR-202005-1243", "iot": { "_id": null, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6405517 }, "last_update_date": "2022-05-17T01:47:48.154000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-612" } ] }, "references": { "_id": null, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-612" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-20-612", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-612", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-612", "ident": null } ] }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA DATACORE IOCTL 0x5218 Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-612" } ], "trust": 0.7 } }
var-202102-0021
Vulnerability from variot
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via PostgreSQL executable, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0021", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11304" }, { "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "db": "NVD", "id": "CVE-2020-13551" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Yuri Kramarz of Cisco Talos.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1261" } ], "trust": 0.6 }, "cve": "CVE-2020-13551", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2020-13551", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2021-11304", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-166341", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "talos-cna@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-13551", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-13551", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-13551", "trust": 1.0, "value": "HIGH" }, { "author": "talos-cna@cisco.com", "id": "CVE-2020-13551", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-13551", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-11304", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202102-1261", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-166341", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11304" }, { "db": "VULHUB", "id": "VHN-166341" }, { "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "db": "CNNVD", "id": "CNNVD-202102-1261" }, { "db": "NVD", "id": "CVE-2020-13551" }, { "db": "NVD", "id": "CVE-2020-13551" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via PostgreSQL executable, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2020-13551" }, { "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "db": "CNVD", "id": "CNVD-2021-11304" }, { "db": "VULHUB", "id": "VHN-166341" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "TALOS", "id": "TALOS-2020-1169", "trust": 3.1 }, { "db": "NVD", "id": "CVE-2020-13551", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-016183", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-11304", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202102-1261", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-166341", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11304" }, { "db": "VULHUB", "id": "VHN-166341" }, { "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "db": "CNNVD", "id": "CNNVD-202102-1261" }, { "db": "NVD", "id": "CVE-2020-13551" } ] }, "id": "VAR-202102-0021", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-11304" }, { "db": "VULHUB", "id": "VHN-166341" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11304" } ] }, "last_update_date": "2024-11-23T22:40:46.656000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada" }, { "title": "Advantech WebAccess/SCADA Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142128" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "db": "CNNVD", "id": "CNNVD-202102-1261" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-166341" }, { "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "db": "NVD", "id": "CVE-2020-13551" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13551" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11304" }, { "db": "VULHUB", "id": "VHN-166341" }, { "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "db": "CNNVD", "id": "CNNVD-202102-1261" }, { "db": "NVD", "id": "CVE-2020-13551" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-11304" }, { "db": "VULHUB", "id": "VHN-166341" }, { "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "db": "CNNVD", "id": "CNNVD-202102-1261" }, { "db": "NVD", "id": "CVE-2020-13551" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11304" }, { "date": "2021-02-17T00:00:00", "db": "VULHUB", "id": "VHN-166341" }, { "date": "2021-11-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "date": "2021-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1261" }, { "date": "2021-02-17T19:15:12.387000", "db": "NVD", "id": "CVE-2020-13551" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11304" }, { "date": "2022-06-29T00:00:00", "db": "VULHUB", "id": "VHN-166341" }, { "date": "2021-11-12T01:25:00", "db": "JVNDB", "id": "JVNDB-2020-016183" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1261" }, { "date": "2024-11-21T05:01:28.800000", "db": "NVD", "id": "CVE-2020-13551" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1261" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0WebAccess/SCADA\u00a0 Vulnerability in privilege management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016183" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1261" } ], "trust": 0.6 } }
var-201906-0329
Vulnerability from variot
Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 10012 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A stack-based buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0329", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess", "scope": "eq", "trust": 1.8, "vendor": "advantech", "version": "8.4.0" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "8.4.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "8.4.0" } ], "sources": [ { "db": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260" }, { "db": "CNVD", "id": "CNVD-2019-18756" }, { "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "db": "NVD", "id": "CVE-2019-3953" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005593" } ] }, "cve": "CVE-2019-3953", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-3953", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-18756", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-155388", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-3953", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-3953", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-3953", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-18756", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-719", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-155388", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260" }, { "db": "CNVD", "id": "CNVD-2019-18756" }, { "db": "VULHUB", "id": "VHN-155388" }, { "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "db": "CNNVD", "id": "CNNVD-201906-719" }, { "db": "NVD", "id": "CVE-2019-3953" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 10012 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A stack-based buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow", "sources": [ { "db": "NVD", "id": "CVE-2019-3953" }, { "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "db": "CNVD", "id": "CNVD-2019-18756" }, { "db": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260" }, { "db": "VULHUB", "id": "VHN-155388" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-3953", "trust": 3.3 }, { "db": "TENABLE", "id": "TRA-2019-28", "trust": 2.4 }, { "db": "TENABLE", "id": "TRA-2019-17", "trust": 2.3 }, { "db": "CNNVD", "id": "CNNVD-201906-719", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-18756", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-005593", "trust": 0.8 }, { "db": "IVD", "id": "FA262F58-BB0D-42B5-8FE7-AB4F4FA95260", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-155388", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260" }, { "db": "CNVD", "id": "CNVD-2019-18756" }, { "db": "VULHUB", "id": "VHN-155388" }, { "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "db": "CNNVD", "id": "CNNVD-201906-719" }, { "db": "NVD", "id": "CVE-2019-3953" } ] }, "id": "VAR-201906-0329", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260" }, { "db": "CNVD", "id": "CNVD-2019-18756" }, { "db": "VULHUB", "id": "VHN-155388" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260" }, { "db": "CNVD", "id": "CNVD-2019-18756" } ] }, "last_update_date": "2024-11-23T22:33:57.006000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Patch for AdvantechWebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-18756)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/164241" }, { "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93903" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18756" }, { "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "db": "CNNVD", "id": "CNNVD-201906-719" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-155388" }, { "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "db": "NVD", "id": "CVE-2019-3953" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://www.tenable.com/security/research/tra-2019-28" }, { "trust": 2.3, "url": "https://www.tenable.com/security/research/tra-2019-17" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3953" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3953" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18756" }, { "db": "VULHUB", "id": "VHN-155388" }, { "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "db": "CNNVD", "id": "CNNVD-201906-719" }, { "db": "NVD", "id": "CVE-2019-3953" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260" }, { "db": "CNVD", "id": "CNVD-2019-18756" }, { "db": "VULHUB", "id": "VHN-155388" }, { "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "db": "CNNVD", "id": "CNNVD-201906-719" }, { "db": "NVD", "id": "CVE-2019-3953" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-21T00:00:00", "db": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260" }, { "date": "2019-06-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-18756" }, { "date": "2019-06-18T00:00:00", "db": "VULHUB", "id": "VHN-155388" }, { "date": "2019-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "date": "2019-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-719" }, { "date": "2019-06-18T23:15:10.527000", "db": "NVD", "id": "CVE-2019-3953" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-18756" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-155388" }, { "date": "2019-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-719" }, { "date": "2024-11-21T04:42:56.070000", "db": "NVD", "id": "CVE-2019-3953" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-719" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005593" }, { "db": "CNNVD", "id": "CNNVD-201906-719" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260" }, { "db": "CNNVD", "id": "CNNVD-201906-719" } ], "trust": 0.8 } }
var-202108-0261
Vulnerability from variot
The affected product is vulnerable to a relative path traversal condition, which may allow an attacker access to unauthorized files and directories on the WebAccess/SCADA (WebAccess/SCADA versions prior to 8.4.5, WebAccess/SCADA versions prior to 9.0.1). Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. WebAccess/SCADA The following multiple vulnerabilities exist in. * Cross-site scripting (CWE-79) - CVE-2021-22676 ‥ * Relative path traversal (CWE-23) - CVE-2021-22674 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2021-32943The expected impact depends on each vulnerability, but it may be affected as follows. * Crafted by a remote third party JavaScript When the code is sent, cookie/ Session tokens can be hijacked, redirected to malicious websites, or unintentionally manipulated in a web browser - CVE-2021-22676 ‥ * A remote third party can access the product's files and directories without authentication. - CVE-2021-22674 ‥ * Arbitrary code executed by a remote third party - CVE-2021-32943.
A path traversal vulnerability exists in Advantech WebAccess/SCADA that stems from the product's failure to add access to input data. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "8.4.5" }, { "model": "webaccess\\/scada", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess\\/scada", "scope": "gte", "trust": 1.0, "vendor": "advantech", "version": "9.0" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "8.4.5 earlier s (v8.4 system )" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "9.0.1 earlier s (v9.0 system )" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.6, "vendor": "advantech", "version": "8.4.5" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59235" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "NVD", "id": "CVE-2021-22674" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "reported these vulnerabilities to CISA.,Chizuru Toyama of TXOne IoT/ICS Security Research Labs, working with Trend Micro\u2019s Zero Day Initiative", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-453" } ], "trust": 0.6 }, "cve": "CVE-2021-22674", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2021-22674", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2021-59235", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-381111", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-22674", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-002265", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22674", "trust": 1.0, "value": "MEDIUM" }, { "author": "OTHER", "id": "JVNDB-2021-002265", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-59235", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202108-453", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-381111", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22674", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59235" }, { "db": "VULHUB", "id": "VHN-381111" }, { "db": "VULMON", "id": "CVE-2021-22674" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-453" }, { "db": "NVD", "id": "CVE-2021-22674" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The affected product is vulnerable to a relative path traversal condition, which may allow an attacker access to unauthorized files and directories on the WebAccess/SCADA (WebAccess/SCADA versions prior to 8.4.5, WebAccess/SCADA versions prior to 9.0.1). Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. WebAccess/SCADA The following multiple vulnerabilities exist in. * Cross-site scripting (CWE-79) - CVE-2021-22676 \u2025 * Relative path traversal (CWE-23) - CVE-2021-22674 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2021-32943The expected impact depends on each vulnerability, but it may be affected as follows. * Crafted by a remote third party JavaScript When the code is sent, cookie/ Session tokens can be hijacked, redirected to malicious websites, or unintentionally manipulated in a web browser - CVE-2021-22676 \u2025 * A remote third party can access the product\u0027s files and directories without authentication. - CVE-2021-22674 \u2025 * Arbitrary code executed by a remote third party - CVE-2021-32943. \n\r\n\r\nA path traversal vulnerability exists in Advantech WebAccess/SCADA that stems from the product\u0027s failure to add access to input data. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements", "sources": [ { "db": "NVD", "id": "CVE-2021-22674" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNVD", "id": "CNVD-2021-59235" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-381111" }, { "db": "VULMON", "id": "CVE-2021-22674" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSA-21-217-04", "trust": 3.2 }, { "db": "NVD", "id": "CVE-2021-22674", "trust": 3.2 }, { "db": "JVN", "id": "JVNVU92588420", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-002265", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-59235", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2656", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021080606", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202108-453", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-381111", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22674", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59235" }, { "db": "VULHUB", "id": "VHN-381111" }, { "db": "VULMON", "id": "CVE-2021-22674" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-453" }, { "db": "NVD", "id": "CVE-2021-22674" } ] }, "id": "VAR-202108-0261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-59235" }, { "db": "VULHUB", "id": "VHN-381111" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59235" } ] }, "last_update_date": "2024-08-14T12:17:33.545000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.tw/support/details/installation?id=1-MS9MJV" }, { "title": "Patch for Advantech WebAccess/SCADA Path Traversal Vulnerability (CNVD-2021-59235)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/284491" }, { "title": "Advantech WebAccess/SCADA Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=158741" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59235" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202108-453" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "CWE-23", "trust": 1.0 }, { "problemtype": "Stack-based buffer overflow (CWE-121) [ Other ]", "trust": 0.8 }, { "problemtype": " Relative path traversal (CWE-23) [ Other ]", "trust": 0.8 }, { "problemtype": " Cross-site scripting (CWE-79) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381111" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "NVD", "id": "CVE-2021-22674" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-217-04" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu92588420" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021080606" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2656" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/22.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59235" }, { "db": "VULHUB", "id": "VHN-381111" }, { "db": "VULMON", "id": "CVE-2021-22674" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-453" }, { "db": "NVD", "id": "CVE-2021-22674" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-59235" }, { "db": "VULHUB", "id": "VHN-381111" }, { "db": "VULMON", "id": "CVE-2021-22674" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-453" }, { "db": "NVD", "id": "CVE-2021-22674" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-08T00:00:00", "db": "CNVD", "id": "CNVD-2021-59235" }, { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-381111" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22674" }, { "date": "2021-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-453" }, { "date": "2021-08-10T14:15:07.250000", "db": "NVD", "id": "CVE-2021-22674" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-18T00:00:00", "db": "CNVD", "id": "CNVD-2021-59235" }, { "date": "2021-08-17T00:00:00", "db": "VULHUB", "id": "VHN-381111" }, { "date": "2021-08-17T00:00:00", "db": "VULMON", "id": "CVE-2021-22674" }, { "date": "2021-08-10T06:49:00", "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-08-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-453" }, { "date": "2021-08-17T20:57:45.050000", "db": "NVD", "id": "CVE-2021-22674" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-453" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0 Made \u00a0WebAccess/SCADA\u00a0 Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002265" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
var-202006-1912
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
Advantech WebAccess/SCADA has a command execution vulnerability that an attacker can use to execute malicious code.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1912", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29401" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-29401", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-29401", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29401" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).\n\r\n\r\nAdvantech WebAccess/SCADA has a command execution vulnerability that an attacker can use to execute malicious code.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29401" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29401", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29401" } ] }, "id": "VAR-202006-1912", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-29401" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29401" } ] }, "last_update_date": "2022-05-04T09:38:08.268000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wanodejs.exe file has command execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/215705" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29401" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29401" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-11T00:00:00", "db": "CNVD", "id": "CNVD-2020-29401" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-29401" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has command execution vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29401" } ], "trust": 0.6 } }
var-202005-0334
Vulnerability from variot
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. Advantech WebAccess Node Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00005241 in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is due to the fact that the program does not correctly verify the length of the data submitted by the user
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 6.3, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 1.9, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 0.9, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "gte", "trust": 0.6, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "9.0.0" } ], "sources": [ { "db": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e" }, { "db": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f" }, { "db": "ZDI", "id": "ZDI-20-625" }, { "db": "ZDI", "id": "ZDI-20-591" }, { "db": "ZDI", "id": "ZDI-20-634" }, { "db": "ZDI", "id": "ZDI-20-624" }, { "db": "ZDI", "id": "ZDI-20-590" }, { "db": "ZDI", "id": "ZDI-20-592" }, { "db": "ZDI", "id": "ZDI-20-622" }, { "db": "ZDI", "id": "ZDI-20-619" }, { "db": "ZDI", "id": "ZDI-20-633" }, { "db": "CNVD", "id": "CNVD-2020-29740" }, { "db": "VULMON", "id": "CVE-2020-12002" }, { "db": "JVNDB", "id": "JVNDB-2020-005161" }, { "db": "NVD", "id": "CVE-2020-12002" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005161" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-625" }, { "db": "ZDI", "id": "ZDI-20-591" }, { "db": "ZDI", "id": "ZDI-20-634" }, { "db": "ZDI", "id": "ZDI-20-624" }, { "db": "ZDI", "id": "ZDI-20-590" }, { "db": "ZDI", "id": "ZDI-20-592" }, { "db": "ZDI", "id": "ZDI-20-622" }, { "db": "ZDI", "id": "ZDI-20-619" }, { "db": "ZDI", "id": "ZDI-20-633" } ], "trust": 6.3 }, "cve": "CVE-2020-12002", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-12002", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005161", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-29740", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "fafb27eb-2f95-48b4-b412-633e1702e89e", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-164637", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12002", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 4.9, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2020-12002", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "NONE", "vectorString": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12002", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005161", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2020-12002", "trust": 4.9, "value": "CRITICAL" }, { "author": "ZDI", "id": "CVE-2020-12002", "trust": 1.4, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2020-12002", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-005161", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-29740", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202005-298", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-164637", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-12002", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e" }, { "db": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f" }, { "db": "ZDI", "id": "ZDI-20-625" }, { "db": "ZDI", "id": "ZDI-20-591" }, { "db": "ZDI", "id": "ZDI-20-634" }, { "db": "ZDI", "id": "ZDI-20-624" }, { "db": "ZDI", "id": "ZDI-20-590" }, { "db": "ZDI", "id": "ZDI-20-592" }, { "db": "ZDI", "id": "ZDI-20-622" }, { "db": "ZDI", "id": "ZDI-20-619" }, { "db": "ZDI", "id": "ZDI-20-633" }, { "db": "CNVD", "id": "CNVD-2020-29740" }, { "db": "VULHUB", "id": "VHN-164637" }, { "db": "VULMON", "id": "CVE-2020-12002" }, { "db": "JVNDB", "id": "JVNDB-2020-005161" }, { "db": "CNNVD", "id": "CNNVD-202005-298" }, { "db": "NVD", "id": "CVE-2020-12002" } ] }, "description": { "_id": null, "data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. Advantech WebAccess Node Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00005241 in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is due to the fact that the program does not correctly verify the length of the data submitted by the user", "sources": [ { "db": "NVD", "id": "CVE-2020-12002" }, { "db": "JVNDB", "id": "JVNDB-2020-005161" }, { "db": "ZDI", "id": "ZDI-20-625" }, { "db": "ZDI", "id": "ZDI-20-591" }, { "db": "ZDI", "id": "ZDI-20-634" }, { "db": "ZDI", "id": "ZDI-20-624" }, { "db": "ZDI", "id": "ZDI-20-590" }, { "db": "ZDI", "id": "ZDI-20-592" }, { "db": "ZDI", "id": "ZDI-20-622" }, { "db": "ZDI", "id": "ZDI-20-619" }, { "db": "ZDI", "id": "ZDI-20-633" }, { "db": "CNVD", "id": "CNVD-2020-29740" }, { "db": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e" }, { "db": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f" }, { "db": "VULHUB", "id": "VHN-164637" }, { "db": "VULMON", "id": "CVE-2020-12002" } ], "trust": 8.37 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-12002", "trust": 9.9 }, { "db": "ICS CERT", "id": "ICSA-20-128-01", "trust": 3.2 }, { "db": "ZDI", "id": "ZDI-20-625", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-591", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-634", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-624", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-590", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-592", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-622", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-619", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-633", "trust": 2.5 }, { "db": "CNVD", "id": "CNVD-2020-29740", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-202005-298", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU93292753", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005161", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10339", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9996", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10080", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10338", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9987", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9906", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10086", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10025", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10079", "trust": 0.7 }, { "db": "NSFOCUS", "id": "47354", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1646", "trust": 0.6 }, { "db": "IVD", "id": "FAFB27EB-2F95-48B4-B412-633E1702E89E", "trust": 0.2 }, { "db": "IVD", "id": "D30FFCD7-838B-4BFA-B622-12761EC4A16F", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-164637", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-12002", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e" }, { "db": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f" }, { "db": "ZDI", "id": "ZDI-20-625" }, { "db": "ZDI", "id": "ZDI-20-591" }, { "db": "ZDI", "id": "ZDI-20-634" }, { "db": "ZDI", "id": "ZDI-20-624" }, { "db": "ZDI", "id": "ZDI-20-590" }, { "db": "ZDI", "id": "ZDI-20-592" }, { "db": "ZDI", "id": "ZDI-20-622" }, { "db": "ZDI", "id": "ZDI-20-619" }, { "db": "ZDI", "id": "ZDI-20-633" }, { "db": "CNVD", "id": "CNVD-2020-29740" }, { "db": "VULHUB", "id": "VHN-164637" }, { "db": "VULMON", "id": "CVE-2020-12002" }, { "db": "JVNDB", "id": "JVNDB-2020-005161" }, { "db": "CNNVD", "id": "CNNVD-202005-298" }, { "db": "NVD", "id": "CVE-2020-12002" } ] }, "id": "VAR-202005-0334", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e" }, { "db": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f" }, { "db": "CNVD", "id": "CNVD-2020-29740" }, { "db": "VULHUB", "id": "VHN-164637" } ], "trust": 1.679503486666667 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e" }, { "db": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f" }, { "db": "CNVD", "id": "CNVD-2020-29740" } ] }, "last_update_date": "2024-11-23T21:59:18.713000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 6.3, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.advantech.com/" }, { "title": "Patch for Advantech WebAccess Node buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/218847" }, { "title": "Advantech WebAccess Node Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=118650" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-625" }, { "db": "ZDI", "id": "ZDI-20-591" }, { "db": "ZDI", "id": "ZDI-20-634" }, { "db": "ZDI", "id": "ZDI-20-624" }, { "db": "ZDI", "id": "ZDI-20-590" }, { "db": "ZDI", "id": "ZDI-20-592" }, { "db": "ZDI", "id": "ZDI-20-622" }, { "db": "ZDI", "id": "ZDI-20-619" }, { "db": "ZDI", "id": "ZDI-20-633" }, { "db": "CNVD", "id": "CNVD-2020-29740" }, { "db": "JVNDB", "id": "JVNDB-2020-005161" }, { "db": "CNNVD", "id": "CNNVD-202005-298" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-787", "trust": 1.9 }, { "problemtype": "CWE-121", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-164637" }, { "db": "JVNDB", "id": "JVNDB-2020-005161" }, { "db": "NVD", "id": "CVE-2020-12002" } ] }, "references": { "_id": null, "data": [ { "trust": 6.3, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "trust": 3.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01" }, { "trust": 2.4, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-634/" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-590/" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-591/" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-592/" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-619/" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-622/" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-624/" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-625/" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-633/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12002" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12002" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93292753/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1646/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47354" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181597" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-625" }, { "db": "ZDI", "id": "ZDI-20-591" }, { "db": "ZDI", "id": "ZDI-20-634" }, { "db": "ZDI", "id": "ZDI-20-624" }, { "db": "ZDI", "id": "ZDI-20-590" }, { "db": "ZDI", "id": "ZDI-20-592" }, { "db": "ZDI", "id": "ZDI-20-622" }, { "db": "ZDI", "id": "ZDI-20-619" }, { "db": "ZDI", "id": "ZDI-20-633" }, { "db": "CNVD", "id": "CNVD-2020-29740" }, { "db": "VULHUB", "id": "VHN-164637" }, { "db": "VULMON", "id": "CVE-2020-12002" }, { "db": "JVNDB", "id": "JVNDB-2020-005161" }, { "db": "CNNVD", "id": "CNNVD-202005-298" }, { "db": "NVD", "id": "CVE-2020-12002" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e", "ident": null }, { "db": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f", "ident": null }, { "db": "ZDI", "id": "ZDI-20-625", "ident": null }, { "db": "ZDI", "id": "ZDI-20-591", "ident": null }, { "db": "ZDI", "id": "ZDI-20-634", "ident": null }, { "db": "ZDI", "id": "ZDI-20-624", "ident": null }, { "db": "ZDI", "id": "ZDI-20-590", "ident": null }, { "db": "ZDI", "id": "ZDI-20-592", "ident": null }, { "db": "ZDI", "id": "ZDI-20-622", "ident": null }, { "db": "ZDI", "id": "ZDI-20-619", "ident": null }, { "db": "ZDI", "id": "ZDI-20-633", "ident": null }, { "db": "CNVD", "id": "CNVD-2020-29740", "ident": null }, { "db": "VULHUB", "id": "VHN-164637", "ident": null }, { "db": "VULMON", "id": "CVE-2020-12002", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2020-005161", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202005-298", "ident": null }, { "db": "NVD", "id": "CVE-2020-12002", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-625", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-591", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-634", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-624", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-590", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-592", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-622", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-619", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-633", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29740", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULHUB", "id": "VHN-164637", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULMON", "id": "CVE-2020-12002", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005161", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-298", "ident": null }, { "date": "2020-05-08T12:15:11.113000", "db": "NVD", "id": "CVE-2020-12002", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-625", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-591", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-634", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-624", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-590", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-592", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-622", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-619", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-633", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29740", "ident": null }, { "date": "2021-09-23T00:00:00", "db": "VULHUB", "id": "VHN-164637", "ident": null }, { "date": "2020-05-12T00:00:00", "db": "VULMON", "id": "CVE-2020-12002", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005161", "ident": null }, { "date": "2021-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-298", "ident": null }, { "date": "2024-11-21T04:59:05.610000", "db": "NVD", "id": "CVE-2020-12002", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-298" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA BwBacNetJ Stack-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-634" }, { "db": "ZDI", "id": "ZDI-20-633" } ], "trust": 1.4 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "fafb27eb-2f95-48b4-b412-633e1702e89e" }, { "db": "IVD", "id": "d30ffcd7-838b-4bfa-b622-12761ec4a16f" }, { "db": "CNNVD", "id": "CNNVD-202005-298" } ], "trust": 1.0 } }
var-202010-1635
Vulnerability from variot
Advantech WebAccess SCADA is a HMI/SCADA monitoring software based entirely on IE browser.
Advantech (China) Co., Ltd. has a binary vulnerability in WebAccess/SCADA. Attackers can use the vulnerability to cause a denial of service.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1635", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-56012" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-56012", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-56012", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-56012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess SCADA is a HMI/SCADA monitoring software based entirely on IE browser.\n\r\n\r\nAdvantech (China) Co., Ltd. has a binary vulnerability in WebAccess/SCADA. Attackers can use the vulnerability to cause a denial of service.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-56012" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-56012", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-56012" } ] }, "id": "VAR-202010-1635", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-56012" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-56012" } ] }, "last_update_date": "2022-05-04T09:08:52.689000Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-56012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-15T00:00:00", "db": "CNVD", "id": "CNVD-2020-56012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-13T00:00:00", "db": "CNVD", "id": "CNVD-2020-56012" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Binary Vulnerability in WebAccess/SCADA of Advantech (China) Co., Ltd.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-56012" } ], "trust": 0.6 } }
var-202005-0338
Vulnerability from variot
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An out-of-bounds vulnerability exists that may allow access to unauthorized data. Advantech WebAccess Node Exists in an out-of-bounds read vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00002722 in ViewSrv.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": "eq", "trust": 1.9, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 1.4, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 0.9, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "gte", "trust": 0.6, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "9.0.0" } ], "sources": [ { "db": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38" }, { "db": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f" }, { "db": "ZDI", "id": "ZDI-20-628" }, { "db": "ZDI", "id": "ZDI-20-630" }, { "db": "CNVD", "id": "CNVD-2020-29738" }, { "db": "VULMON", "id": "CVE-2020-12018" }, { "db": "JVNDB", "id": "JVNDB-2020-005145" }, { "db": "NVD", "id": "CVE-2020-12018" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005145" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-628" }, { "db": "ZDI", "id": "ZDI-20-630" } ], "trust": 1.4 }, "cve": "CVE-2020-12018", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-12018", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005145", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-29738", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-164654", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12018", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12018", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005145", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2020-12018", "trust": 1.4, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2020-12018", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-005145", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-29738", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202005-292", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-164654", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-12018", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38" }, { "db": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f" }, { "db": "ZDI", "id": "ZDI-20-628" }, { "db": "ZDI", "id": "ZDI-20-630" }, { "db": "CNVD", "id": "CNVD-2020-29738" }, { "db": "VULHUB", "id": "VHN-164654" }, { "db": "VULMON", "id": "CVE-2020-12018" }, { "db": "JVNDB", "id": "JVNDB-2020-005145" }, { "db": "CNNVD", "id": "CNNVD-202005-292" }, { "db": "NVD", "id": "CVE-2020-12018" } ] }, "description": { "_id": null, "data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An out-of-bounds vulnerability exists that may allow access to unauthorized data. Advantech WebAccess Node Exists in an out-of-bounds read vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00002722 in ViewSrv.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required", "sources": [ { "db": "NVD", "id": "CVE-2020-12018" }, { "db": "JVNDB", "id": "JVNDB-2020-005145" }, { "db": "ZDI", "id": "ZDI-20-628" }, { "db": "ZDI", "id": "ZDI-20-630" }, { "db": "CNVD", "id": "CNVD-2020-29738" }, { "db": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38" }, { "db": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f" }, { "db": "VULHUB", "id": "VHN-164654" }, { "db": "VULMON", "id": "CVE-2020-12018" } ], "trust": 3.96 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-12018", "trust": 5.0 }, { "db": "ICS CERT", "id": "ICSA-20-128-01", "trust": 3.2 }, { "db": "ZDI", "id": "ZDI-20-628", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-630", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2020-29738", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-202005-292", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU93292753", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005145", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9903", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9896", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1646", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47308", "trust": 0.6 }, { "db": "IVD", "id": "0C0A4C5A-B413-4EB0-98C1-1ACC2309CA38", "trust": 0.2 }, { "db": "IVD", "id": "2CD25065-FDF0-47DB-8723-F8FA644FF39F", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-164654", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-12018", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38" }, { "db": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f" }, { "db": "ZDI", "id": "ZDI-20-628" }, { "db": "ZDI", "id": "ZDI-20-630" }, { "db": "CNVD", "id": "CNVD-2020-29738" }, { "db": "VULHUB", "id": "VHN-164654" }, { "db": "VULMON", "id": "CVE-2020-12018" }, { "db": "JVNDB", "id": "JVNDB-2020-005145" }, { "db": "CNNVD", "id": "CNNVD-202005-292" }, { "db": "NVD", "id": "CVE-2020-12018" } ] }, "id": "VAR-202005-0338", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38" }, { "db": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f" }, { "db": "CNVD", "id": "CNVD-2020-29738" }, { "db": "VULHUB", "id": "VHN-164654" } ], "trust": 1.679503486666667 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38" }, { "db": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f" }, { "db": "CNVD", "id": "CNVD-2020-29738" } ] }, "last_update_date": "2024-11-23T21:59:18.487000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.advantech.com/" }, { "title": "Patch for Advantech WebAccess Node out-of-bounds reading vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/218843" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-628" }, { "db": "ZDI", "id": "ZDI-20-630" }, { "db": "CNVD", "id": "CNVD-2020-29738" }, { "db": "JVNDB", "id": "JVNDB-2020-005145" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-125", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-164654" }, { "db": "JVNDB", "id": "JVNDB-2020-005145" }, { "db": "NVD", "id": "CVE-2020-12018" } ] }, "references": { "_id": null, "data": [ { "trust": 3.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-628/" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12018" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12018" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93292753/" }, { "trust": 0.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-630/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47308" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1646/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181601" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-628" }, { "db": "ZDI", "id": "ZDI-20-630" }, { "db": "CNVD", "id": "CNVD-2020-29738" }, { "db": "VULHUB", "id": "VHN-164654" }, { "db": "VULMON", "id": "CVE-2020-12018" }, { "db": "JVNDB", "id": "JVNDB-2020-005145" }, { "db": "CNNVD", "id": "CNNVD-202005-292" }, { "db": "NVD", "id": "CVE-2020-12018" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38", "ident": null }, { "db": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f", "ident": null }, { "db": "ZDI", "id": "ZDI-20-628", "ident": null }, { "db": "ZDI", "id": "ZDI-20-630", "ident": null }, { "db": "CNVD", "id": "CNVD-2020-29738", "ident": null }, { "db": "VULHUB", "id": "VHN-164654", "ident": null }, { "db": "VULMON", "id": "CVE-2020-12018", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2020-005145", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202005-292", "ident": null }, { "db": "NVD", "id": "CVE-2020-12018", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-628", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-630", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29738", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULHUB", "id": "VHN-164654", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULMON", "id": "CVE-2020-12018", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005145", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-292", "ident": null }, { "date": "2020-05-08T12:15:11.317000", "db": "NVD", "id": "CVE-2020-12018", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-628", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-630", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29738", "ident": null }, { "date": "2020-05-11T00:00:00", "db": "VULHUB", "id": "VHN-164654", "ident": null }, { "date": "2020-05-11T00:00:00", "db": "VULMON", "id": "CVE-2020-12018", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005145", "ident": null }, { "date": "2021-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-292", "ident": null }, { "date": "2024-11-21T04:59:07.480000", "db": "NVD", "id": "CVE-2020-12018", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-292" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess Node Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005145" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "0c0a4c5a-b413-4eb0-98c1-1acc2309ca38" }, { "db": "IVD", "id": "2cd25065-fdf0-47db-8723-f8fa644ff39f" }, { "db": "CNNVD", "id": "CNNVD-202005-292" } ], "trust": 1.0 } }
var-202006-1910
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
Advantech WebAccess/SCADA has a command execution vulnerability that an attacker can use to execute malicious code.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1910", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29400" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-29400", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-29400", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29400" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).\n\r\n\r\nAdvantech WebAccess/SCADA has a command execution vulnerability that an attacker can use to execute malicious code.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29400" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29400", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29400" } ] }, "id": "VAR-202006-1910", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-29400" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29400" } ] }, "last_update_date": "2022-05-04T09:38:08.280000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA winslbl file exists system command injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/215707" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29400" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29400" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-11T00:00:00", "db": "CNVD", "id": "CNVD-2020-29400" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-29400" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-29400)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29400" } ], "trust": 0.6 } }
var-202102-0024
Vulnerability from variot
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11308" }, { "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "db": "NVD", "id": "CVE-2020-13555" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Yuri Kramarz of Cisco Talos.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1263" } ], "trust": 0.6 }, "cve": "CVE-2020-13555", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2020-13555", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2021-11308", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-166345", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "talos-cna@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-13555", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-13555", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-13555", "trust": 1.0, "value": "HIGH" }, { "author": "talos-cna@cisco.com", "id": "CVE-2020-13555", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-13555", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-11308", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202102-1263", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-166345", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11308" }, { "db": "VULHUB", "id": "VHN-166345" }, { "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "db": "CNNVD", "id": "CNNVD-202102-1263" }, { "db": "NVD", "id": "CVE-2020-13555" }, { "db": "NVD", "id": "CVE-2020-13555" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2020-13555" }, { "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "db": "CNVD", "id": "CNVD-2021-11308" }, { "db": "VULHUB", "id": "VHN-166345" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "TALOS", "id": "TALOS-2020-1169", "trust": 3.1 }, { "db": "NVD", "id": "CVE-2020-13555", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-016180", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-11308", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202102-1263", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-166345", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11308" }, { "db": "VULHUB", "id": "VHN-166345" }, { "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "db": "CNNVD", "id": "CNNVD-202102-1263" }, { "db": "NVD", "id": "CVE-2020-13555" } ] }, "id": "VAR-202102-0024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-11308" }, { "db": "VULHUB", "id": "VHN-166345" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11308" } ] }, "last_update_date": "2024-11-23T22:40:46.685000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada" }, { "title": "Advantech WebAccess/SCADA Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142130" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "db": "CNNVD", "id": "CNNVD-202102-1263" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-166345" }, { "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "db": "NVD", "id": "CVE-2020-13555" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13555" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11308" }, { "db": "VULHUB", "id": "VHN-166345" }, { "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "db": "CNNVD", "id": "CNNVD-202102-1263" }, { "db": "NVD", "id": "CVE-2020-13555" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-11308" }, { "db": "VULHUB", "id": "VHN-166345" }, { "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "db": "CNNVD", "id": "CNNVD-202102-1263" }, { "db": "NVD", "id": "CVE-2020-13555" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11308" }, { "date": "2021-02-17T00:00:00", "db": "VULHUB", "id": "VHN-166345" }, { "date": "2021-11-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "date": "2021-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1263" }, { "date": "2021-02-17T19:15:12.590000", "db": "NVD", "id": "CVE-2020-13555" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11308" }, { "date": "2022-06-29T00:00:00", "db": "VULHUB", "id": "VHN-166345" }, { "date": "2021-11-12T00:59:00", "db": "JVNDB", "id": "JVNDB-2020-016180" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1263" }, { "date": "2024-11-21T05:01:29.303000", "db": "NVD", "id": "CVE-2020-13555" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1263" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0WebAccess/SCADA\u00a0 Vulnerability in privilege management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016180" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1263" } ], "trust": 0.6 } }
var-201904-0184
Vulnerability from variot
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may allow an attacker to cause a denial-of-service condition. Advantech WebAccess/SCADA Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within UninstallWA.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple command-injection vulnerabilities 2. A denial-of-service vulnerability 3. Multiple stack-based buffer-overflow vulnerabilities An attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 0.8, "vendor": "advantech", "version": "8.3.5 and less" }, { "_id": null, "model": "webaccess", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3" }, { "_id": null, "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.4" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c" }, { "db": "ZDI", "id": "ZDI-19-331" }, { "db": "CNVD", "id": "CNVD-2019-08947" }, { "db": "BID", "id": "107675" }, { "db": "JVNDB", "id": "JVNDB-2019-003119" }, { "db": "NVD", "id": "CVE-2019-6554" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003119" } ] }, "credits": { "_id": null, "data": "Mat Powell of Trend Micro Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-19-331" } ], "trust": 0.7 }, "cve": "CVE-2019-6554", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-6554", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2019-08947", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-157989", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-6554", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-6554", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-6554", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6554", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-6554", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2019-6554", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-08947", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201904-094", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-157989", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c" }, { "db": "ZDI", "id": "ZDI-19-331" }, { "db": "CNVD", "id": "CNVD-2019-08947" }, { "db": "VULHUB", "id": "VHN-157989" }, { "db": "JVNDB", "id": "JVNDB-2019-003119" }, { "db": "CNNVD", "id": "CNNVD-201904-094" }, { "db": "NVD", "id": "CVE-2019-6554" } ] }, "description": { "_id": null, "data": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may allow an attacker to cause a denial-of-service condition. Advantech WebAccess/SCADA Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within UninstallWA.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple command-injection vulnerabilities\n2. A denial-of-service vulnerability\n3. Multiple stack-based buffer-overflow vulnerabilities\nAn attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions", "sources": [ { "db": "NVD", "id": "CVE-2019-6554" }, { "db": "JVNDB", "id": "JVNDB-2019-003119" }, { "db": "ZDI", "id": "ZDI-19-331" }, { "db": "CNVD", "id": "CNVD-2019-08947" }, { "db": "BID", "id": "107675" }, { "db": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c" }, { "db": "VULHUB", "id": "VHN-157989" } ], "trust": 3.33 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2019-6554", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-19-092-01", "trust": 3.4 }, { "db": "ZDI", "id": "ZDI-19-331", "trust": 1.3 }, { "db": "CNNVD", "id": "CNNVD-201904-094", "trust": 0.9 }, { "db": "BID", "id": "107675", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-08947", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-003119", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7908", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.1113", "trust": 0.6 }, { "db": "IVD", "id": "6A9BB3F5-E6BE-4DC2-9D2B-57459A62BF8C", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-157989", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c" }, { "db": "ZDI", "id": "ZDI-19-331" }, { "db": "CNVD", "id": "CNVD-2019-08947" }, { "db": "VULHUB", "id": "VHN-157989" }, { "db": "BID", "id": "107675" }, { "db": "JVNDB", "id": "JVNDB-2019-003119" }, { "db": "CNNVD", "id": "CNNVD-201904-094" }, { "db": "NVD", "id": "CVE-2019-6554" } ] }, "id": "VAR-201904-0184", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c" }, { "db": "CNVD", "id": "CNVD-2019-08947" }, { "db": "VULHUB", "id": "VHN-157989" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c" }, { "db": "CNVD", "id": "CNVD-2019-08947" } ] }, "last_update_date": "2024-11-23T22:17:06.371000Z", "patch": { "_id": null, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" }, { "title": "Advantech WebAccess/SCADA Patch for Incorrect Access Control Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/157947" }, { "title": "Advantech WebAccess and Advantech WebAccess/SCADA Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91017" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-331" }, { "db": "CNVD", "id": "CNVD-2019-08947" }, { "db": "JVNDB", "id": "JVNDB-2019-003119" }, { "db": "CNNVD", "id": "CNNVD-201904-094" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-284", "trust": 1.9 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157989" }, { "db": "JVNDB", "id": "JVNDB-2019-003119" }, { "db": "NVD", "id": "CVE-2019-6554" } ] }, "references": { "_id": null, "data": [ { "trust": 4.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6554" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/107675" }, { "trust": 0.9, "url": "https://www.advantech.com/" }, { "trust": 0.9, "url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6554" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-331/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78318" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-331" }, { "db": "CNVD", "id": "CNVD-2019-08947" }, { "db": "VULHUB", "id": "VHN-157989" }, { "db": "BID", "id": "107675" }, { "db": "JVNDB", "id": "JVNDB-2019-003119" }, { "db": "CNNVD", "id": "CNNVD-201904-094" }, { "db": "NVD", "id": "CVE-2019-6554" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c", "ident": null }, { "db": "ZDI", "id": "ZDI-19-331", "ident": null }, { "db": "CNVD", "id": "CNVD-2019-08947", "ident": null }, { "db": "VULHUB", "id": "VHN-157989", "ident": null }, { "db": "BID", "id": "107675", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2019-003119", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201904-094", "ident": null }, { "db": "NVD", "id": "CVE-2019-6554", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2019-04-03T00:00:00", "db": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-331", "ident": null }, { "date": "2019-04-03T00:00:00", "db": "CNVD", "id": "CNVD-2019-08947", "ident": null }, { "date": "2019-04-05T00:00:00", "db": "VULHUB", "id": "VHN-157989", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "BID", "id": "107675", "ident": null }, { "date": "2019-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003119", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-094", "ident": null }, { "date": "2019-04-05T19:29:00.407000", "db": "NVD", "id": "CVE-2019-6554", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-331", "ident": null }, { "date": "2019-04-03T00:00:00", "db": "CNVD", "id": "CNVD-2019-08947", "ident": null }, { "date": "2020-10-16T00:00:00", "db": "VULHUB", "id": "VHN-157989", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "BID", "id": "107675", "ident": null }, { "date": "2019-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003119", "ident": null }, { "date": "2020-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-094", "ident": null }, { "date": "2024-11-21T04:46:41.090000", "db": "NVD", "id": "CVE-2019-6554", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-094" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA Incorrect access control vulnerability", "sources": [ { "db": "IVD", "id": "6a9bb3f5-e6be-4dc2-9d2b-57459a62bf8c" }, { "db": "CNVD", "id": "CNVD-2019-08947" } ], "trust": 0.8 }, "type": { "_id": null, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-094" } ], "trust": 0.6 } }
var-201801-1494
Vulnerability from variot
A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. An attacker has read access to files within the directory structure of the target device. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the filename parameter of certUpdate.asp. The issue results from the lack of proper validation of user-supplied data, which can allow for the upload of arbitrary files. An attacker can leverage this vulnerability to execute code under the context of the current process. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA has a directory traversal vulnerability. Advantech WebAccess/SCADA is prone to a directory-traversal vulnerability and a SQL-injection vulnerability A remote attacker could exploit these issues to access data, or exploit latent vulnerabilities in the underlying database or use directory-traversal characters ('../') to access arbitrary files that contain sensitive information. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-1494", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "8.2_20170817" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.8, "vendor": "advantech", "version": "8.2_20170817" }, { "model": "webaccess node", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null }, { "model": "webaccess/scada \u003cv8.2 20170817", "scope": null, "trust": 0.6, "vendor": "advantech", "version": null }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.0" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "7.2" }, { "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.3" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess scada", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-142" }, { "db": "CNVD", "id": "CNVD-2018-01709" }, { "db": "BID", "id": "102781" }, { "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "db": "NVD", "id": "CVE-2018-5445" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-001575" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-142" } ], "trust": 0.7 }, "cve": "CVE-2018-5445", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-5445", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-5445", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-01709", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-135476", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2018-5445", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-5445", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-5445", "trust": 0.8, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2018-5445", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-01709", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201801-958", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-135476", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-142" }, { "db": "CNVD", "id": "CNVD-2018-01709" }, { "db": "VULHUB", "id": "VHN-135476" }, { "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "db": "CNNVD", "id": "CNNVD-201801-958" }, { "db": "NVD", "id": "CVE-2018-5445" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. An attacker has read access to files within the directory structure of the target device. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the filename parameter of certUpdate.asp. The issue results from the lack of proper validation of user-supplied data, which can allow for the upload of arbitrary files. An attacker can leverage this vulnerability to execute code under the context of the current process. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA has a directory traversal vulnerability. Advantech WebAccess/SCADA is prone to a directory-traversal vulnerability and a SQL-injection vulnerability\nA remote attacker could exploit these issues to access data, or exploit latent vulnerabilities in the underlying database or use directory-traversal characters (\u0027../\u0027) to access arbitrary files that contain sensitive information. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2018-5445" }, { "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "db": "ZDI", "id": "ZDI-18-142" }, { "db": "CNVD", "id": "CNVD-2018-01709" }, { "db": "BID", "id": "102781" }, { "db": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-135476" } ], "trust": 3.33 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-5445", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-18-023-01", "trust": 3.4 }, { "db": "BID", "id": "102781", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201801-958", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2018-01709", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-001575", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5492", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-142", "trust": 0.7 }, { "db": "IVD", "id": "E2E2B54F-39AB-11E9-B4D4-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-135476", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-142" }, { "db": "CNVD", "id": "CNVD-2018-01709" }, { "db": "VULHUB", "id": "VHN-135476" }, { "db": "BID", "id": "102781" }, { "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "db": "CNNVD", "id": "CNNVD-201801-958" }, { "db": "NVD", "id": "CVE-2018-5445" } ] }, "id": "VAR-201801-1494", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-01709" }, { "db": "VULHUB", "id": "VHN-135476" } ], "trust": 1.6679344999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-01709" } ] }, "last_update_date": "2024-11-23T22:34:24.928000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada" }, { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-023-01" }, { "title": "Advantech WebAccess/SCADA Directory Traversal Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/114215" }, { "title": "Advantech WebAccess/SCADA Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=78082" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-142" }, { "db": "CNVD", "id": "CNVD-2018-01709" }, { "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "db": "CNNVD", "id": "CNNVD-201801-958" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135476" }, { "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "db": "NVD", "id": "CVE-2018-5445" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-01" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/102781" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5445" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5445" }, { "trust": 0.6, "url": "https://www.proxyit.cc/advisories/icsa-18-023-01" }, { "trust": 0.3, "url": "http://www.advantech.in/" }, { "trust": 0.3, "url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-142" }, { "db": "CNVD", "id": "CNVD-2018-01709" }, { "db": "VULHUB", "id": "VHN-135476" }, { "db": "BID", "id": "102781" }, { "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "db": "CNNVD", "id": "CNNVD-201801-958" }, { "db": "NVD", "id": "CVE-2018-5445" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-142" }, { "db": "CNVD", "id": "CNVD-2018-01709" }, { "db": "VULHUB", "id": "VHN-135476" }, { "db": "BID", "id": "102781" }, { "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "db": "CNNVD", "id": "CNNVD-201801-958" }, { "db": "NVD", "id": "CVE-2018-5445" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-24T00:00:00", "db": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1" }, { "date": "2018-02-06T00:00:00", "db": "ZDI", "id": "ZDI-18-142" }, { "date": "2018-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2018-01709" }, { "date": "2018-01-25T00:00:00", "db": "VULHUB", "id": "VHN-135476" }, { "date": "2018-01-23T00:00:00", "db": "BID", "id": "102781" }, { "date": "2018-02-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "date": "2018-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-958" }, { "date": "2018-01-25T03:29:00.367000", "db": "NVD", "id": "CVE-2018-5445" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-02-09T00:00:00", "db": "ZDI", "id": "ZDI-18-142" }, { "date": "2018-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2018-01709" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-135476" }, { "date": "2018-01-23T00:00:00", "db": "BID", "id": "102781" }, { "date": "2018-02-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-958" }, { "date": "2024-11-21T04:08:49.057000", "db": "NVD", "id": "CVE-2018-5445" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201801-958" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA Path traversal vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-001575" }, { "db": "CNNVD", "id": "CNNVD-201801-958" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201801-958" } ], "trust": 0.8 } }
var-202005-1241
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5213 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202005-1241", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-609" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-609" } ], "trust": 0.7 }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "ZDI-20-609", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-609", "trust": 0.7, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-609" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5213 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.", "sources": [ { "db": "ZDI", "id": "ZDI-20-609" } ], "trust": 0.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-9939", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-609", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-609" } ] }, "id": "VAR-202005-1241", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6405517 }, "last_update_date": "2022-05-17T01:47:48.169000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-609" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-609" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-609" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-609" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-609" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA DATACORE IOCTL 0x5213 Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-609" } ], "trust": 0.7 } }
var-202008-1299
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has logic flaws. Attackers can use the vulnerability to access and modify the registry of the user's system, and can execute arbitrary commands on the user's system.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1299", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48620" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2020-48620", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48620", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48620" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has logic flaws. Attackers can use the vulnerability to access and modify the registry of the user\u0027s system, and can execute arbitrary commands on the user\u0027s system.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48620" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48620", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48620" } ] }, "id": "VAR-202008-1299", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48620" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48620" } ] }, "last_update_date": "2022-05-04T09:46:18.641000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control IWshShell_Class class RegWrite member has logic defect vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225695" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48620" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48620" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48620" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48620" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has logic flaw vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48620" } ], "trust": 0.6 } }
var-202011-1537
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1537", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58469" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-58469", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-58469", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58469" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58469" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58469", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58469" } ] }, "id": "VAR-202011-1537", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-58469" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58469" } ] }, "last_update_date": "2022-05-04T08:52:25.603000Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58469" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-58469" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-58469" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58469)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58469" } ], "trust": 0.6 } }
var-201906-1025
Vulnerability from variot
In WebAccess/SCADA, Versions 8.3.5 and prior, a path traversal vulnerability is caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage this vulnerability to delete files while posing as an administrator. WebAccess/SCADA Contains a path traversal vulnerability.Information may be tampered with. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x2715 IOCTL in the webvrpcs process. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. Multiple heap-based buffer-overflow vulnerabilities 4. An information disclosure vulnerability 5. Multiple remote-code execution vulnerabilities An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (â??../â??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. Advantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.8, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.1" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.0" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "7.2" }, { "_id": null, "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.4.1" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6" }, { "db": "ZDI", "id": "ZDI-19-622" }, { "db": "CNVD", "id": "CNVD-2019-32476" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005816" }, { "db": "NVD", "id": "CVE-2019-10985" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005816" } ] }, "credits": { "_id": null, "data": "Mat Powell of Trend Micro Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-19-622" } ], "trust": 0.7 }, "cve": "CVE-2019-10985", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-10985", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-32476", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "ca331763-0568-4e00-aca9-d10db9f939d6", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-142586", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-10985", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-10985", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-10985", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-10985", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-10985", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2019-10985", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-32476", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-1074", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-142586", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6" }, { "db": "ZDI", "id": "ZDI-19-622" }, { "db": "CNVD", "id": "CNVD-2019-32476" }, { "db": "VULHUB", "id": "VHN-142586" }, { "db": "JVNDB", "id": "JVNDB-2019-005816" }, { "db": "CNNVD", "id": "CNNVD-201906-1074" }, { "db": "NVD", "id": "CVE-2019-10985" } ] }, "description": { "_id": null, "data": "In WebAccess/SCADA, Versions 8.3.5 and prior, a path traversal vulnerability is caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage this vulnerability to delete files while posing as an administrator. WebAccess/SCADA Contains a path traversal vulnerability.Information may be tampered with. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x2715 IOCTL in the webvrpcs process. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities:\n1. A directory-traversal vulnerability\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. Multiple heap-based buffer-overflow vulnerabilities\n4. An information disclosure vulnerability\n5. Multiple remote-code execution vulnerabilities\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (\u00e2??../\u00e2??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. \nAdvantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2019-10985" }, { "db": "JVNDB", "id": "JVNDB-2019-005816" }, { "db": "ZDI", "id": "ZDI-19-622" }, { "db": "CNVD", "id": "CNVD-2019-32476" }, { "db": "BID", "id": "108923" }, { "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6" }, { "db": "VULHUB", "id": "VHN-142586" } ], "trust": 3.33 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2019-10985", "trust": 4.3 }, { "db": "ZDI", "id": "ZDI-19-622", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-19-178-05", "trust": 2.8 }, { "db": "CNNVD", "id": "CNNVD-201906-1074", "trust": 0.9 }, { "db": "BID", "id": "108923", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32476", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-005816", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8194", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2350", "trust": 0.6 }, { "db": "IVD", "id": "CA331763-0568-4E00-ACA9-D10DB9F939D6", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-142586", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6" }, { "db": "ZDI", "id": "ZDI-19-622" }, { "db": "CNVD", "id": "CNVD-2019-32476" }, { "db": "VULHUB", "id": "VHN-142586" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005816" }, { "db": "CNNVD", "id": "CNNVD-201906-1074" }, { "db": "NVD", "id": "CVE-2019-10985" } ] }, "id": "VAR-201906-1025", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6" }, { "db": "CNVD", "id": "CNVD-2019-32476" }, { "db": "VULHUB", "id": "VHN-142586" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6" }, { "db": "CNVD", "id": "CNVD-2019-32476" } ] }, "last_update_date": "2024-11-23T21:52:09.506000Z", "patch": { "_id": null, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "title": "Patch for Advantech WebAccess/SCADA Path Traversal Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181493" }, { "title": "Advantech WebAccess/SCADA Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=94177" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-622" }, { "db": "CNVD", "id": "CNVD-2019-32476" }, { "db": "JVNDB", "id": "JVNDB-2019-005816" }, { "db": "CNNVD", "id": "CNNVD-201906-1074" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142586" }, { "db": "JVNDB", "id": "JVNDB-2019-005816" }, { "db": "NVD", "id": "CVE-2019-10985" } ] }, "references": { "_id": null, "data": [ { "trust": 3.5, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-622/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10985" }, { "trust": 0.9, "url": "http://webaccess.advantech.com" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10985" }, { "trust": 0.6, "url": "https://www.securityfocus.com/bid/108923" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2350/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-622" }, { "db": "CNVD", "id": "CNVD-2019-32476" }, { "db": "VULHUB", "id": "VHN-142586" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005816" }, { "db": "CNNVD", "id": "CNNVD-201906-1074" }, { "db": "NVD", "id": "CVE-2019-10985" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6", "ident": null }, { "db": "ZDI", "id": "ZDI-19-622", "ident": null }, { "db": "CNVD", "id": "CNVD-2019-32476", "ident": null }, { "db": "VULHUB", "id": "VHN-142586", "ident": null }, { "db": "BID", "id": "108923", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2019-005816", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201906-1074", "ident": null }, { "db": "NVD", "id": "CVE-2019-10985", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-622", "ident": null }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32476", "ident": null }, { "date": "2019-06-28T00:00:00", "db": "VULHUB", "id": "VHN-142586", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005816", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1074", "ident": null }, { "date": "2019-06-28T21:15:11.117000", "db": "NVD", "id": "CVE-2019-10985", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-622", "ident": null }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32476", "ident": null }, { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-142586", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005816", "ident": null }, { "date": "2023-03-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1074", "ident": null }, { "date": "2024-11-21T04:20:17.927000", "db": "NVD", "id": "CVE-2019-10985", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-1074" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA Path traversal vulnerability", "sources": [ { "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6" }, { "db": "CNVD", "id": "CNVD-2019-32476" }, { "db": "CNNVD", "id": "CNNVD-201906-1074" } ], "trust": 1.4 }, "type": { "_id": null, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "ca331763-0568-4e00-aca9-d10db9f939d6" }, { "db": "CNNVD", "id": "CNNVD-201906-1074" } ], "trust": 0.8 } }
var-202008-1302
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1302", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48624" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CNVD-2020-48624", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48624", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48624" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48624" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48624", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48624" } ] }, "id": "VAR-202008-1302", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48624" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48624" } ] }, "last_update_date": "2022-05-04T09:59:46.987000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control FileSystemObject class DeleteFile member has arbitrary file deletion vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225689" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48624" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48624" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48624" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48624" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-48624)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48624" } ], "trust": 0.6 } }
var-202005-1244
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5209 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-607" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-607" } ], "trust": 0.7 }, "cvss": { "_id": null, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "ZDI-20-607", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-607", "trust": 0.7, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-607" } ] }, "description": { "_id": null, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5209 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.", "sources": [ { "db": "ZDI", "id": "ZDI-20-607" } ], "trust": 0.7 }, "external_ids": { "_id": null, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-9936", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-607", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-607" } ] }, "id": "VAR-202005-1244", "iot": { "_id": null, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6405517 }, "last_update_date": "2022-05-17T01:36:00.872000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-607" } ] }, "references": { "_id": null, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-607" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-20-607", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-607", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-607", "ident": null } ] }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA DATACORE IOCTL 0x5209 Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-607" } ], "trust": 0.7 } }
var-202102-0020
Vulnerability from variot
A local file inclusion vulnerability exists in the installation functionality of Advantech WebAccess/SCADA 9.0.1. A specially crafted application can lead to information disclosure. An attacker can send an authenticated HTTP request to trigger this vulnerability. Advantech WebAccess/SCADA Contains a path traversal vulnerability.Information may be obtained. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. There is a path traversal vulnerability in Advantech WebAccess/SCADA, which originates from the failure of network systems or products to properly filter resources or special elements in file paths. An attacker could exploit this vulnerability to access locations outside of restricted directories
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0020", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11303" }, { "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "db": "NVD", "id": "CVE-2020-13550" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Yuri Kramarz of Cisco Talos.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1262" } ], "trust": 0.6 }, "cve": "CVE-2020-13550", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2020-13550", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 1.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 2.7, "id": "CNVD-2021-11303", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-166340", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "talos-cna@cisco.com", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.1, "id": "CVE-2020-13550", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.1, "id": "CVE-2020-13550", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-13550", "trust": 1.0, "value": "HIGH" }, { "author": "talos-cna@cisco.com", "id": "CVE-2020-13550", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-13550", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-11303", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202102-1262", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-166340", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11303" }, { "db": "VULHUB", "id": "VHN-166340" }, { "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "db": "CNNVD", "id": "CNNVD-202102-1262" }, { "db": "NVD", "id": "CVE-2020-13550" }, { "db": "NVD", "id": "CVE-2020-13550" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A local file inclusion vulnerability exists in the installation functionality of Advantech WebAccess/SCADA 9.0.1. A specially crafted application can lead to information disclosure. An attacker can send an authenticated HTTP request to trigger this vulnerability. Advantech WebAccess/SCADA Contains a path traversal vulnerability.Information may be obtained. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. There is a path traversal vulnerability in Advantech WebAccess/SCADA, which originates from the failure of network systems or products to properly filter resources or special elements in file paths. An attacker could exploit this vulnerability to access locations outside of restricted directories", "sources": [ { "db": "NVD", "id": "CVE-2020-13550" }, { "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "db": "CNVD", "id": "CNVD-2021-11303" }, { "db": "VULHUB", "id": "VHN-166340" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-13550", "trust": 3.1 }, { "db": "TALOS", "id": "TALOS-2020-1168", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-016431", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-11303", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202102-1262", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-166340", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11303" }, { "db": "VULHUB", "id": "VHN-166340" }, { "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "db": "CNNVD", "id": "CNNVD-202102-1262" }, { "db": "NVD", "id": "CVE-2020-13550" } ] }, "id": "VAR-202102-0020", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-11303" }, { "db": "VULHUB", "id": "VHN-166340" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11303" } ] }, "last_update_date": "2024-11-23T22:16:09.118000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada" }, { "title": "Advantech WebAccess/SCADA Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142129" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "db": "CNNVD", "id": "CNNVD-202102-1262" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-166340" }, { "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "db": "NVD", "id": "CVE-2020-13550" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1168" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13550" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11303" }, { "db": "VULHUB", "id": "VHN-166340" }, { "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "db": "CNNVD", "id": "CNNVD-202102-1262" }, { "db": "NVD", "id": "CVE-2020-13550" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-11303" }, { "db": "VULHUB", "id": "VHN-166340" }, { "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "db": "CNNVD", "id": "CNNVD-202102-1262" }, { "db": "NVD", "id": "CVE-2020-13550" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11303" }, { "date": "2021-02-17T00:00:00", "db": "VULHUB", "id": "VHN-166340" }, { "date": "2021-12-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "date": "2021-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1262" }, { "date": "2021-02-17T19:15:12.293000", "db": "NVD", "id": "CVE-2020-13550" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11303" }, { "date": "2022-06-29T00:00:00", "db": "VULHUB", "id": "VHN-166340" }, { "date": "2021-12-03T03:02:00", "db": "JVNDB", "id": "JVNDB-2020-016431" }, { "date": "2021-02-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1262" }, { "date": "2024-11-21T05:01:28.670000", "db": "NVD", "id": "CVE-2020-13550" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1262" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0WebAccess/SCADA\u00a0 Traversal Vulnerability in Japan", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016431" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1262" } ], "trust": 0.6 } }
var-201904-0182
Vulnerability from variot
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwrunmie.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple command-injection vulnerabilities 2. A denial-of-service vulnerability 3. Multiple stack-based buffer-overflow vulnerabilities An attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions. The vulnerability comes from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": null, "trust": 1.4, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 0.8, "vendor": "advantech", "version": "8.3.5 and less" }, { "_id": null, "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3" }, { "_id": null, "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.4" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa" }, { "db": "ZDI", "id": "ZDI-19-326" }, { "db": "ZDI", "id": "ZDI-19-324" }, { "db": "CNVD", "id": "CNVD-2019-08949" }, { "db": "BID", "id": "107675" }, { "db": "JVNDB", "id": "JVNDB-2019-003120" }, { "db": "NVD", "id": "CVE-2019-6552" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003120" } ] }, "credits": { "_id": null, "data": "Mat Powell of Trend Micro Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-19-326" }, { "db": "ZDI", "id": "ZDI-19-324" } ], "trust": 1.4 }, "cve": "CVE-2019-6552", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-6552", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-08949", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-157987", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-6552", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-6552", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6552", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2019-6552", "trust": 1.4, "value": "CRITICAL" }, { "author": "nvd@nist.gov", "id": "CVE-2019-6552", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-6552", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-08949", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201904-091", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-157987", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-6552", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa" }, { "db": "ZDI", "id": "ZDI-19-326" }, { "db": "ZDI", "id": "ZDI-19-324" }, { "db": "CNVD", "id": "CNVD-2019-08949" }, { "db": "VULHUB", "id": "VHN-157987" }, { "db": "VULMON", "id": "CVE-2019-6552" }, { "db": "JVNDB", "id": "JVNDB-2019-003120" }, { "db": "CNNVD", "id": "CNNVD-201904-091" }, { "db": "NVD", "id": "CVE-2019-6552" } ] }, "description": { "_id": null, "data": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwrunmie.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple command-injection vulnerabilities\n2. A denial-of-service vulnerability\n3. Multiple stack-based buffer-overflow vulnerabilities\nAn attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions. The vulnerability comes from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data", "sources": [ { "db": "NVD", "id": "CVE-2019-6552" }, { "db": "JVNDB", "id": "JVNDB-2019-003120" }, { "db": "ZDI", "id": "ZDI-19-326" }, { "db": "ZDI", "id": "ZDI-19-324" }, { "db": "CNVD", "id": "CNVD-2019-08949" }, { "db": "BID", "id": "107675" }, { "db": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa" }, { "db": "VULHUB", "id": "VHN-157987" }, { "db": "VULMON", "id": "CVE-2019-6552" } ], "trust": 4.05 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2019-6552", "trust": 5.1 }, { "db": "ICS CERT", "id": "ICSA-19-092-01", "trust": 3.5 }, { "db": "ZDI", "id": "ZDI-19-326", "trust": 1.3 }, { "db": "BID", "id": "107675", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201904-091", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-08949", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-003120", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7928", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7926", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-324", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.1113", "trust": 0.6 }, { "db": "IVD", "id": "7965849B-AD7C-448A-ABFE-D9BB6EA63FFA", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-157987", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-6552", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa" }, { "db": "ZDI", "id": "ZDI-19-326" }, { "db": "ZDI", "id": "ZDI-19-324" }, { "db": "CNVD", "id": "CNVD-2019-08949" }, { "db": "VULHUB", "id": "VHN-157987" }, { "db": "VULMON", "id": "CVE-2019-6552" }, { "db": "BID", "id": "107675" }, { "db": "JVNDB", "id": "JVNDB-2019-003120" }, { "db": "CNNVD", "id": "CNNVD-201904-091" }, { "db": "NVD", "id": "CVE-2019-6552" } ] }, "id": "VAR-201904-0182", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa" }, { "db": "CNVD", "id": "CNVD-2019-08949" }, { "db": "VULHUB", "id": "VHN-157987" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa" }, { "db": "CNVD", "id": "CNVD-2019-08949" } ] }, "last_update_date": "2024-11-23T22:17:06.420000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" }, { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Patch for Advantech WebAccess/SCADA Command Injection Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/157943" }, { "title": "Advantech WebAccess and Advantech WebAccess/SCADA Fixes for command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91015" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-326" }, { "db": "ZDI", "id": "ZDI-19-324" }, { "db": "CNVD", "id": "CNVD-2019-08949" }, { "db": "JVNDB", "id": "JVNDB-2019-003120" }, { "db": "CNNVD", "id": "CNNVD-201904-091" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-77", "trust": 1.9 }, { "problemtype": "CWE-78", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157987" }, { "db": "JVNDB", "id": "JVNDB-2019-003120" }, { "db": "NVD", "id": "CVE-2019-6552" } ] }, "references": { "_id": null, "data": [ { "trust": 5.0, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6552" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/107675" }, { "trust": 0.9, "url": "https://www.advantech.com/" }, { "trust": 0.9, "url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6552" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-326/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78318" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-326" }, { "db": "ZDI", "id": "ZDI-19-324" }, { "db": "CNVD", "id": "CNVD-2019-08949" }, { "db": "VULHUB", "id": "VHN-157987" }, { "db": "VULMON", "id": "CVE-2019-6552" }, { "db": "BID", "id": "107675" }, { "db": "JVNDB", "id": "JVNDB-2019-003120" }, { "db": "CNNVD", "id": "CNNVD-201904-091" }, { "db": "NVD", "id": "CVE-2019-6552" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa", "ident": null }, { "db": "ZDI", "id": "ZDI-19-326", "ident": null }, { "db": "ZDI", "id": "ZDI-19-324", "ident": null }, { "db": "CNVD", "id": "CNVD-2019-08949", "ident": null }, { "db": "VULHUB", "id": "VHN-157987", "ident": null }, { "db": "VULMON", "id": "CVE-2019-6552", "ident": null }, { "db": "BID", "id": "107675", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2019-003120", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201904-091", "ident": null }, { "db": "NVD", "id": "CVE-2019-6552", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2019-04-03T00:00:00", "db": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-326", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-324", "ident": null }, { "date": "2019-04-03T00:00:00", "db": "CNVD", "id": "CNVD-2019-08949", "ident": null }, { "date": "2019-04-05T00:00:00", "db": "VULHUB", "id": "VHN-157987", "ident": null }, { "date": "2019-04-05T00:00:00", "db": "VULMON", "id": "CVE-2019-6552", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "BID", "id": "107675", "ident": null }, { "date": "2019-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003120", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-091", "ident": null }, { "date": "2019-04-05T19:29:00.357000", "db": "NVD", "id": "CVE-2019-6552", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-326", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "ZDI", "id": "ZDI-19-324", "ident": null }, { "date": "2019-04-03T00:00:00", "db": "CNVD", "id": "CNVD-2019-08949", "ident": null }, { "date": "2020-10-06T00:00:00", "db": "VULHUB", "id": "VHN-157987", "ident": null }, { "date": "2020-10-06T00:00:00", "db": "VULMON", "id": "CVE-2019-6552", "ident": null }, { "date": "2019-04-02T00:00:00", "db": "BID", "id": "107675", "ident": null }, { "date": "2019-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003120", "ident": null }, { "date": "2020-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-091", "ident": null }, { "date": "2024-11-21T04:46:40.877000", "db": "NVD", "id": "CVE-2019-6552", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-091" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA Command injection vulnerability", "sources": [ { "db": "IVD", "id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa" }, { "db": "CNVD", "id": "CNVD-2019-08949" }, { "db": "JVNDB", "id": "JVNDB-2019-003120" } ], "trust": 1.6 }, "type": { "_id": null, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-091" } ], "trust": 0.6 } }
var-201902-0124
Vulnerability from variot
WebAccess/SCADA, Version 8.3. The software does not properly sanitize its inputs for SQL commands. WebAccess/SCADA Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A SQL injection vulnerability exists in Advantech WebAccess/SCADA version 8.3. A remote attacker can exploit the vulnerability to execute SQL commands by sending a specially crafted request. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. An SQL-injection vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201902-0124", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 1.7, "vendor": "advantech", "version": "8.3" }, { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "8.3" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess scada", "version": "8.3" } ], "sources": [ { "db": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03260" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001598" }, { "db": "NVD", "id": "CVE-2019-6523" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001598" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Devesh Logendran from Attila Cybertech Pte. Ltd.", "sources": [ { "db": "BID", "id": "106722" }, { "db": "CNNVD", "id": "CNNVD-201901-890" } ], "trust": 0.9 }, "cve": "CVE-2019-6523", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-6523", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-03260", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "7d85de81-463f-11e9-a845-000c29342cb1", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-157958", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-6523", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6523", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-6523", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-03260", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201901-890", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-157958", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-6523", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03260" }, { "db": "VULHUB", "id": "VHN-157958" }, { "db": "VULMON", "id": "CVE-2019-6523" }, { "db": "JVNDB", "id": "JVNDB-2019-001598" }, { "db": "CNNVD", "id": "CNNVD-201901-890" }, { "db": "NVD", "id": "CVE-2019-6523" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA, Version 8.3. The software does not properly sanitize its inputs for SQL commands. WebAccess/SCADA Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A SQL injection vulnerability exists in Advantech WebAccess/SCADA version 8.3. A remote attacker can exploit the vulnerability to execute SQL commands by sending a specially crafted request. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple authentication-bypass vulnerabilities\n2. An SQL-injection vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database", "sources": [ { "db": "NVD", "id": "CVE-2019-6523" }, { "db": "JVNDB", "id": "JVNDB-2019-001598" }, { "db": "CNVD", "id": "CNVD-2019-03260" }, { "db": "BID", "id": "106722" }, { "db": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-157958" }, { "db": "VULMON", "id": "CVE-2019-6523" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6523", "trust": 3.7 }, { "db": "ICS CERT", "id": "ICSA-19-024-01", "trust": 3.5 }, { "db": "BID", "id": "106722", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201901-890", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-03260", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-001598", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-19-024-01T", "trust": 0.6 }, { "db": "IVD", "id": "7D85DE81-463F-11E9-A845-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-157958", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-6523", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03260" }, { "db": "VULHUB", "id": "VHN-157958" }, { "db": "VULMON", "id": "CVE-2019-6523" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001598" }, { "db": "CNNVD", "id": "CNNVD-201901-890" }, { "db": "NVD", "id": "CVE-2019-6523" } ] }, "id": "VAR-201902-0124", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03260" }, { "db": "VULHUB", "id": "VHN-157958" } ], "trust": 1.5586422 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03260" } ] }, "last_update_date": "2024-11-23T22:37:55.435000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.advantech.com/" }, { "title": "Patch for Advantech WebAccess/SCADA SQL Injection Vulnerability (CNVD-2019-03260)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/151743" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-03260" }, { "db": "JVNDB", "id": "JVNDB-2019-001598" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-89", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157958" }, { "db": "JVNDB", "id": "JVNDB-2019-001598" }, { "db": "NVD", "id": "CVE-2019-6523" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/106722" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6523" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6523" }, { "trust": 0.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01third party advisoryus government resource" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/106722third party advisoryvdb entry" }, { "trust": 0.3, "url": "https://www.advantech.com/" }, { "trust": 0.3, "url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/89.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-03260" }, { "db": "VULHUB", "id": "VHN-157958" }, { "db": "VULMON", "id": "CVE-2019-6523" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001598" }, { "db": "CNNVD", "id": "CNNVD-201901-890" }, { "db": "NVD", "id": "CVE-2019-6523" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03260" }, { "db": "VULHUB", "id": "VHN-157958" }, { "db": "VULMON", "id": "CVE-2019-6523" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001598" }, { "db": "CNNVD", "id": "CNNVD-201901-890" }, { "db": "NVD", "id": "CVE-2019-6523" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-30T00:00:00", "db": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1" }, { "date": "2019-01-28T00:00:00", "db": "CNVD", "id": "CNVD-2019-03260" }, { "date": "2019-02-05T00:00:00", "db": "VULHUB", "id": "VHN-157958" }, { "date": "2019-02-05T00:00:00", "db": "VULMON", "id": "CVE-2019-6523" }, { "date": "2019-01-24T00:00:00", "db": "BID", "id": "106722" }, { "date": "2019-03-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001598" }, { "date": "2019-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-890" }, { "date": "2019-02-05T21:29:00.863000", "db": "NVD", "id": "CVE-2019-6523" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-30T00:00:00", "db": "CNVD", "id": "CNVD-2019-03260" }, { "date": "2019-02-06T00:00:00", "db": "VULHUB", "id": "VHN-157958" }, { "date": "2019-02-06T00:00:00", "db": "VULMON", "id": "CVE-2019-6523" }, { "date": "2019-01-24T00:00:00", "db": "BID", "id": "106722" }, { "date": "2019-03-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001598" }, { "date": "2019-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-890" }, { "date": "2024-11-21T04:46:37.410000", "db": "NVD", "id": "CVE-2019-6523" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-890" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA In SQL Injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001598" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection", "sources": [ { "db": "IVD", "id": "7d85de81-463f-11e9-a845-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201901-890" } ], "trust": 0.8 } }
var-201906-0330
Vulnerability from variot
Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 81024 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0330", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess", "scope": "eq", "trust": 1.8, "vendor": "advantech", "version": "8.4.0" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "8.4.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "8.4.0" } ], "sources": [ { "db": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad" }, { "db": "CNVD", "id": "CNVD-2019-18839" }, { "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "db": "NVD", "id": "CVE-2019-3954" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005594" } ] }, "cve": "CVE-2019-3954", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-3954", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-18839", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-155389", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-3954", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-3954", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-3954", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-18839", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-724", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-155389", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad" }, { "db": "CNVD", "id": "CNVD-2019-18839" }, { "db": "VULHUB", "id": "VHN-155389" }, { "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "db": "CNNVD", "id": "CNNVD-201906-724" }, { "db": "NVD", "id": "CVE-2019-3954" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 81024 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow", "sources": [ { "db": "NVD", "id": "CVE-2019-3954" }, { "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "db": "CNVD", "id": "CNVD-2019-18839" }, { "db": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad" }, { "db": "VULHUB", "id": "VHN-155389" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-3954", "trust": 3.3 }, { "db": "TENABLE", "id": "TRA-2019-28", "trust": 3.1 }, { "db": "CNNVD", "id": "CNNVD-201906-724", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-18839", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-005594", "trust": 0.8 }, { "db": "IVD", "id": "FD36FFFD-9D2A-4D51-AC7D-BAA7412A79AD", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-155389", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad" }, { "db": "CNVD", "id": "CNVD-2019-18839" }, { "db": "VULHUB", "id": "VHN-155389" }, { "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "db": "CNNVD", "id": "CNNVD-201906-724" }, { "db": "NVD", "id": "CVE-2019-3954" } ] }, "id": "VAR-201906-0330", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad" }, { "db": "CNVD", "id": "CNVD-2019-18839" }, { "db": "VULHUB", "id": "VHN-155389" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad" }, { "db": "CNVD", "id": "CNVD-2019-18839" } ] }, "last_update_date": "2024-11-23T22:33:57.134000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Patch for AdvantechWebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-18839)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/164439" }, { "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93906" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18839" }, { "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "db": "CNNVD", "id": "CNNVD-201906-724" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-155389" }, { "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "db": "NVD", "id": "CVE-2019-3954" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://www.tenable.com/security/research/tra-2019-28" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3954" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3954" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-18839" }, { "db": "VULHUB", "id": "VHN-155389" }, { "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "db": "CNNVD", "id": "CNNVD-201906-724" }, { "db": "NVD", "id": "CVE-2019-3954" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad" }, { "db": "CNVD", "id": "CNVD-2019-18839" }, { "db": "VULHUB", "id": "VHN-155389" }, { "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "db": "CNNVD", "id": "CNNVD-201906-724" }, { "db": "NVD", "id": "CVE-2019-3954" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-21T00:00:00", "db": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad" }, { "date": "2019-06-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-18839" }, { "date": "2019-06-19T00:00:00", "db": "VULHUB", "id": "VHN-155389" }, { "date": "2019-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "date": "2019-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-724" }, { "date": "2019-06-19T00:15:13.360000", "db": "NVD", "id": "CVE-2019-3954" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-18839" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-155389" }, { "date": "2019-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-724" }, { "date": "2024-11-21T04:42:56.187000", "db": "NVD", "id": "CVE-2019-3954" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-724" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005594" }, { "db": "CNNVD", "id": "CNNVD-201906-724" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad" }, { "db": "CNNVD", "id": "CNNVD-201906-724" } ], "trust": 0.8 } }
var-201906-1024
Vulnerability from variot
In WebAccess/SCADA Versions 8.3.5 and prior, an out-of-bounds read vulnerability is caused by a lack of proper validation of user-supplied data. Exploitation of this vulnerability may allow disclosure of information. WebAccess/SCADA Contains an out-of-bounds vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within viewsrv.dll, which is accessed through the 0x2722 IOCTL in the webvrpcs process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA 8.3.5 and earlier that could allow an attacker to cause a buffer overflow or heap overflow. Advantech WebAccess/SCADA is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. Multiple heap-based buffer-overflow vulnerabilities 4. Multiple remote-code execution vulnerabilities An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (â??../â??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. Advantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in the execution of wrong data to other associated memory locations. read and write operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess", "scope": "lte", "trust": 1.8, "vendor": "advantech", "version": "8.3.5" }, { "model": "webaccess", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null }, { "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=8.3.5" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.0" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "7.2" }, { "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.4.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75" }, { "db": "ZDI", "id": "ZDI-19-621" }, { "db": "CNVD", "id": "CNVD-2019-32477" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "db": "NVD", "id": "CVE-2019-10983" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005817" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mat Powell of Trend Micro Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-19-621" } ], "trust": 0.7 }, "cve": "CVE-2019-10983", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-10983", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-32477", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-142584", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-10983", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-10983", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2019-10983", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-10983", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-10983", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2019-10983", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-32477", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-1073", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-142584", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75" }, { "db": "ZDI", "id": "ZDI-19-621" }, { "db": "CNVD", "id": "CNVD-2019-32477" }, { "db": "VULHUB", "id": "VHN-142584" }, { "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "db": "CNNVD", "id": "CNNVD-201906-1073" }, { "db": "NVD", "id": "CVE-2019-10983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In WebAccess/SCADA Versions 8.3.5 and prior, an out-of-bounds read vulnerability is caused by a lack of proper validation of user-supplied data. Exploitation of this vulnerability may allow disclosure of information. WebAccess/SCADA Contains an out-of-bounds vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within viewsrv.dll, which is accessed through the 0x2722 IOCTL in the webvrpcs process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA 8.3.5 and earlier that could allow an attacker to cause a buffer overflow or heap overflow. Advantech WebAccess/SCADA is prone to the following security vulnerabilities:\n1. A directory-traversal vulnerability\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. Multiple heap-based buffer-overflow vulnerabilities\n4. Multiple remote-code execution vulnerabilities\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (\u00e2??../\u00e2??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. \nAdvantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in the execution of wrong data to other associated memory locations. read and write operations", "sources": [ { "db": "NVD", "id": "CVE-2019-10983" }, { "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "db": "ZDI", "id": "ZDI-19-621" }, { "db": "CNVD", "id": "CNVD-2019-32477" }, { "db": "BID", "id": "108923" }, { "db": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75" }, { "db": "VULHUB", "id": "VHN-142584" } ], "trust": 3.33 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-10983", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-19-178-05", "trust": 2.8 }, { "db": "ZDI", "id": "ZDI-19-621", "trust": 2.4 }, { "db": "BID", "id": "108923", "trust": 1.5 }, { "db": "CNNVD", "id": "CNNVD-201906-1073", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32477", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-005817", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8193", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2350", "trust": 0.6 }, { "db": "IVD", "id": "5F89DA07-DAA5-4005-B08F-ACEC3E1B8E75", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-142584", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75" }, { "db": "ZDI", "id": "ZDI-19-621" }, { "db": "CNVD", "id": "CNVD-2019-32477" }, { "db": "VULHUB", "id": "VHN-142584" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "db": "CNNVD", "id": "CNNVD-201906-1073" }, { "db": "NVD", "id": "CVE-2019-10983" } ] }, "id": "VAR-201906-1024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75" }, { "db": "CNVD", "id": "CNVD-2019-32477" }, { "db": "VULHUB", "id": "VHN-142584" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75" }, { "db": "CNVD", "id": "CNVD-2019-32477" } ] }, "last_update_date": "2024-11-23T21:52:09.335000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-32477)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181489" }, { "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94176" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-621" }, { "db": "CNVD", "id": "CNVD-2019-32477" }, { "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "db": "CNNVD", "id": "CNNVD-201906-1073" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142584" }, { "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "db": "NVD", "id": "CVE-2019-10983" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-621/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10983" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/108923" }, { "trust": 0.9, "url": "http://webaccess.advantech.com" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10983" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2350/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-621" }, { "db": "CNVD", "id": "CNVD-2019-32477" }, { "db": "VULHUB", "id": "VHN-142584" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "db": "CNNVD", "id": "CNNVD-201906-1073" }, { "db": "NVD", "id": "CVE-2019-10983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75" }, { "db": "ZDI", "id": "ZDI-19-621" }, { "db": "CNVD", "id": "CNVD-2019-32477" }, { "db": "VULHUB", "id": "VHN-142584" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "db": "CNNVD", "id": "CNNVD-201906-1073" }, { "db": "NVD", "id": "CVE-2019-10983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75" }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-621" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32477" }, { "date": "2019-06-28T00:00:00", "db": "VULHUB", "id": "VHN-142584" }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923" }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "date": "2019-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1073" }, { "date": "2019-06-28T21:15:11.057000", "db": "NVD", "id": "CVE-2019-10983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-621" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32477" }, { "date": "2019-07-02T00:00:00", "db": "VULHUB", "id": "VHN-142584" }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923" }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005817" }, { "date": "2019-07-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1073" }, { "date": "2024-11-21T04:20:17.693000", "db": "NVD", "id": "CVE-2019-10983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-1073" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA Vulnerable to out-of-bounds reading", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005817" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "5f89da07-daa5-4005-b08f-acec3e1b8e75" }, { "db": "CNNVD", "id": "CNNVD-201906-1073" } ], "trust": 0.8 } }
var-202008-1298
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1298", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48619" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2020-48619", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48619", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48619" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48619" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48619", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48619" } ] }, "id": "VAR-202008-1298", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48619" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48619" } ] }, "last_update_date": "2022-05-04T10:03:27.008000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control IWshShell_Class class run member has a command execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225703" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48619" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48619" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48619" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48619" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-48619)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48619" } ], "trust": 0.6 } }
var-202008-1297
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1297", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48618" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2020-48618", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48618", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48618" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48618" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48618", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48618" } ] }, "id": "VAR-202008-1297", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48618" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48618" } ] }, "last_update_date": "2022-05-04T09:42:19.867000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control WshShell class exec member has a command execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225697" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48618" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48618" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48618" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48618" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-48618)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48618" } ], "trust": 0.6 } }
var-201902-0123
Vulnerability from variot
WebAccess/SCADA, Version 8.3. Specially crafted requests could allow a possible authentication bypass that could allow an attacker to obtain and manipulate sensitive information. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. An SQL-injection vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201902-0123", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 1.7, "vendor": "advantech", "version": "8.3" }, { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "8.3" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess scada", "version": "8.3" } ], "sources": [ { "db": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d" }, { "db": "CNVD", "id": "CNVD-2019-32479" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001597" }, { "db": "NVD", "id": "CVE-2019-6521" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001597" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Devesh Logendran from Attila Cybertech Pte. Ltd.", "sources": [ { "db": "BID", "id": "106722" }, { "db": "CNNVD", "id": "CNNVD-201901-889" } ], "trust": 0.9 }, "cve": "CVE-2019-6521", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-6521", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-32479", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-157956", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-6521", "impactScore": 4.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6521", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-6521", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2019-32479", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201901-889", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-157956", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d" }, { "db": "CNVD", "id": "CNVD-2019-32479" }, { "db": "VULHUB", "id": "VHN-157956" }, { "db": "JVNDB", "id": "JVNDB-2019-001597" }, { "db": "CNNVD", "id": "CNNVD-201901-889" }, { "db": "NVD", "id": "CVE-2019-6521" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA, Version 8.3. Specially crafted requests could allow a possible authentication bypass that could allow an attacker to obtain and manipulate sensitive information. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple authentication-bypass vulnerabilities\n2. An SQL-injection vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database", "sources": [ { "db": "NVD", "id": "CVE-2019-6521" }, { "db": "JVNDB", "id": "JVNDB-2019-001597" }, { "db": "CNVD", "id": "CNVD-2019-32479" }, { "db": "BID", "id": "106722" }, { "db": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d" }, { "db": "VULHUB", "id": "VHN-157956" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6521", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-19-024-01", "trust": 2.8 }, { "db": "BID", "id": "106722", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201901-889", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32479", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-001597", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-19-024-01T", "trust": 0.6 }, { "db": "IVD", "id": "A390DD39-1C31-478B-BFF6-C1D917A3E87D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-157956", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d" }, { "db": "CNVD", "id": "CNVD-2019-32479" }, { "db": "VULHUB", "id": "VHN-157956" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001597" }, { "db": "CNNVD", "id": "CNNVD-201901-889" }, { "db": "NVD", "id": "CVE-2019-6521" } ] }, "id": "VAR-201902-0123", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d" }, { "db": "CNVD", "id": "CNVD-2019-32479" }, { "db": "VULHUB", "id": "VHN-157956" } ], "trust": 1.5586422 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d" }, { "db": "CNVD", "id": "CNVD-2019-32479" } ] }, "last_update_date": "2024-11-23T22:37:55.477000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.advantech.com/" }, { "title": "Patch for Advantech WebAccess/SCADA Authorization Issue Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181477" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32479" }, { "db": "JVNDB", "id": "JVNDB-2019-001597" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157956" }, { "db": "JVNDB", "id": "JVNDB-2019-001597" }, { "db": "NVD", "id": "CVE-2019-6521" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/106722" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6521" }, { "trust": 0.9, "url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6521" }, { "trust": 0.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01third party advisoryus government resource" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/106722third party advisoryvdb entry" }, { "trust": 0.3, "url": "https://www.advantech.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32479" }, { "db": "VULHUB", "id": "VHN-157956" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001597" }, { "db": "CNNVD", "id": "CNNVD-201901-889" }, { "db": "NVD", "id": "CVE-2019-6521" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d" }, { "db": "CNVD", "id": "CNVD-2019-32479" }, { "db": "VULHUB", "id": "VHN-157956" }, { "db": "BID", "id": "106722" }, { "db": "JVNDB", "id": "JVNDB-2019-001597" }, { "db": "CNNVD", "id": "CNNVD-201901-889" }, { "db": "NVD", "id": "CVE-2019-6521" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32479" }, { "date": "2019-02-05T00:00:00", "db": "VULHUB", "id": "VHN-157956" }, { "date": "2019-01-24T00:00:00", "db": "BID", "id": "106722" }, { "date": "2019-03-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001597" }, { "date": "2019-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-889" }, { "date": "2019-02-05T21:29:00.800000", "db": "NVD", "id": "CVE-2019-6521" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32479" }, { "date": "2019-02-06T00:00:00", "db": "VULHUB", "id": "VHN-157956" }, { "date": "2019-01-24T00:00:00", "db": "BID", "id": "106722" }, { "date": "2019-03-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001597" }, { "date": "2019-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-889" }, { "date": "2024-11-21T04:46:37.157000", "db": "NVD", "id": "CVE-2019-6521" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-889" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA Authorization Issue Vulnerability", "sources": [ { "db": "IVD", "id": "a390dd39-1c31-478b-bff6-c1d917a3e87d" }, { "db": "CNVD", "id": "CNVD-2019-32479" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-889" } ], "trust": 0.6 } }
var-202011-1535
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1535", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58465" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-58465", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-58465", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58465" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58465" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58465", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58465" } ] }, "id": "VAR-202011-1535", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-58465" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58465" } ] }, "last_update_date": "2022-05-04T09:08:50.179000Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58465" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-58465" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-58465" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58465)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58465" } ], "trust": 0.6 } }
var-202102-0022
Vulnerability from variot
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via multiple service executables in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0022", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11305" }, { "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "db": "NVD", "id": "CVE-2020-13552" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Yuri Kramarz of Cisco Talos.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1259" } ], "trust": 0.6 }, "cve": "CVE-2020-13552", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2020-13552", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2021-11305", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-166342", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "talos-cna@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-13552", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-13552", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-13552", "trust": 1.0, "value": "HIGH" }, { "author": "talos-cna@cisco.com", "id": "CVE-2020-13552", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-13552", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-11305", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202102-1259", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-166342", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11305" }, { "db": "VULHUB", "id": "VHN-166342" }, { "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "db": "CNNVD", "id": "CNNVD-202102-1259" }, { "db": "NVD", "id": "CVE-2020-13552" }, { "db": "NVD", "id": "CVE-2020-13552" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via multiple service executables in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2020-13552" }, { "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "db": "CNVD", "id": "CNVD-2021-11305" }, { "db": "VULHUB", "id": "VHN-166342" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "TALOS", "id": "TALOS-2020-1169", "trust": 3.1 }, { "db": "NVD", "id": "CVE-2020-13552", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-016182", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-11305", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202102-1259", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-166342", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11305" }, { "db": "VULHUB", "id": "VHN-166342" }, { "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "db": "CNNVD", "id": "CNNVD-202102-1259" }, { "db": "NVD", "id": "CVE-2020-13552" } ] }, "id": "VAR-202102-0022", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-11305" }, { "db": "VULHUB", "id": "VHN-166342" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11305" } ] }, "last_update_date": "2024-11-23T22:40:46.773000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada" }, { "title": "Advantech WebAccess/SCADA Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142126" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "db": "CNNVD", "id": "CNNVD-202102-1259" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-166342" }, { "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "db": "NVD", "id": "CVE-2020-13552" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13552" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11305" }, { "db": "VULHUB", "id": "VHN-166342" }, { "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "db": "CNNVD", "id": "CNNVD-202102-1259" }, { "db": "NVD", "id": "CVE-2020-13552" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-11305" }, { "db": "VULHUB", "id": "VHN-166342" }, { "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "db": "CNNVD", "id": "CNNVD-202102-1259" }, { "db": "NVD", "id": "CVE-2020-13552" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11305" }, { "date": "2021-02-17T00:00:00", "db": "VULHUB", "id": "VHN-166342" }, { "date": "2021-11-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "date": "2021-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1259" }, { "date": "2021-02-17T19:15:12.450000", "db": "NVD", "id": "CVE-2020-13552" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11305" }, { "date": "2022-06-29T00:00:00", "db": "VULHUB", "id": "VHN-166342" }, { "date": "2021-11-12T01:22:00", "db": "JVNDB", "id": "JVNDB-2020-016182" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-1259" }, { "date": "2024-11-21T05:01:28.920000", "db": "NVD", "id": "CVE-2020-13552" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1259" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0WebAccess/SCADA\u00a0 Vulnerability in privilege management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016182" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-1259" } ], "trust": 0.6 } }
var-202108-0262
Vulnerability from variot
UserExcelOut.asp within WebAccess/SCADA is vulnerable to cross-site scripting (XSS), which could allow an attacker to send malicious JavaScript code. This could result in hijacking of cookie/session tokens, redirection to a malicious webpage, and unintended browser action on the WebAccess/SCADA (WebAccess/SCADA versions prior to 8.4.5, WebAccess/SCADA versions prior to 9.0.1). Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. WebAccess/SCADA The following multiple vulnerabilities exist in. * Cross-site scripting (CWE-79) - CVE-2021-22676 ‥ * Relative path traversal (CWE-23) - CVE-2021-22674 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2021-32943The expected impact depends on each vulnerability, but it may be affected as follows. * Crafted by a remote third party JavaScript When the code is sent, cookie/ Session tokens can be hijacked, redirected to malicious websites, or unintentionally manipulated in a web browser - CVE-2021-22676 ‥ * A remote third party can access the product's files and directories without authentication. - CVE-2021-22674 ‥ * Arbitrary code executed by a remote third party - CVE-2021-32943.
A cross-site scripting vulnerability exists in Advantech WebAccess/SCADA, which stems from UserExcelOut.asp failing to properly verify the correctness of user data. An attacker could use this vulnerability to hijack the cookie session token and execute client-side code. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0262", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "8.4.5" }, { "model": "webaccess\\/scada", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess\\/scada", "scope": "gte", "trust": 1.0, "vendor": "advantech", "version": "9.0" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "8.4.5 earlier s (v8.4 system )" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "9.0.1 earlier s (v9.0 system )" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.6, "vendor": "advantech", "version": "8.4.5" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59236" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "NVD", "id": "CVE-2021-22676" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "reported these vulnerabilities to CISA.,Chizuru Toyama of TXOne IoT/ICS Security Research Labs, working with Trend Micro\u2019s Zero Day Initiative", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-459" } ], "trust": 0.6 }, "cve": "CVE-2021-22676", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-22676", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2021-59236", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-381113", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2021-22676", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-002265", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22676", "trust": 1.0, "value": "MEDIUM" }, { "author": "OTHER", "id": "JVNDB-2021-002265", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-59236", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202108-459", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-381113", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22676", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59236" }, { "db": "VULHUB", "id": "VHN-381113" }, { "db": "VULMON", "id": "CVE-2021-22676" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-459" }, { "db": "NVD", "id": "CVE-2021-22676" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "UserExcelOut.asp within WebAccess/SCADA is vulnerable to cross-site scripting (XSS), which could allow an attacker to send malicious JavaScript code. This could result in hijacking of cookie/session tokens, redirection to a malicious webpage, and unintended browser action on the WebAccess/SCADA (WebAccess/SCADA versions prior to 8.4.5, WebAccess/SCADA versions prior to 9.0.1). Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. WebAccess/SCADA The following multiple vulnerabilities exist in. * Cross-site scripting (CWE-79) - CVE-2021-22676 \u2025 * Relative path traversal (CWE-23) - CVE-2021-22674 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2021-32943The expected impact depends on each vulnerability, but it may be affected as follows. * Crafted by a remote third party JavaScript When the code is sent, cookie/ Session tokens can be hijacked, redirected to malicious websites, or unintentionally manipulated in a web browser - CVE-2021-22676 \u2025 * A remote third party can access the product\u0027s files and directories without authentication. - CVE-2021-22674 \u2025 * Arbitrary code executed by a remote third party - CVE-2021-32943. \n\r\n\r\nA cross-site scripting vulnerability exists in Advantech WebAccess/SCADA, which stems from UserExcelOut.asp failing to properly verify the correctness of user data. An attacker could use this vulnerability to hijack the cookie session token and execute client-side code. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements", "sources": [ { "db": "NVD", "id": "CVE-2021-22676" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNVD", "id": "CNVD-2021-59236" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-381113" }, { "db": "VULMON", "id": "CVE-2021-22676" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSA-21-217-04", "trust": 3.2 }, { "db": "NVD", "id": "CVE-2021-22676", "trust": 3.2 }, { "db": "JVN", "id": "JVNVU92588420", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-002265", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-59236", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2656", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021080606", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202108-459", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-381113", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22676", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59236" }, { "db": "VULHUB", "id": "VHN-381113" }, { "db": "VULMON", "id": "CVE-2021-22676" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-459" }, { "db": "NVD", "id": "CVE-2021-22676" } ] }, "id": "VAR-202108-0262", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-59236" }, { "db": "VULHUB", "id": "VHN-381113" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59236" } ] }, "last_update_date": "2024-08-14T12:09:59.994000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.tw/support/details/installation?id=1-MS9MJV" }, { "title": "Patch for Advantech WebAccess/SCADA Cross-Site Scripting Vulnerability (CNVD-2021-59236)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/284496" }, { "title": "Advantech WebAccess/SCADA Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=158747" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59236" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202108-459" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.1 }, { "problemtype": "Stack-based buffer overflow (CWE-121) [ Other ]", "trust": 0.8 }, { "problemtype": " Relative path traversal (CWE-23) [ Other ]", "trust": 0.8 }, { "problemtype": " Cross-site scripting (CWE-79) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381113" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "NVD", "id": "CVE-2021-22676" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-217-04" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu92588420" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021080606" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2656" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59236" }, { "db": "VULHUB", "id": "VHN-381113" }, { "db": "VULMON", "id": "CVE-2021-22676" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-459" }, { "db": "NVD", "id": "CVE-2021-22676" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-59236" }, { "db": "VULHUB", "id": "VHN-381113" }, { "db": "VULMON", "id": "CVE-2021-22676" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-459" }, { "db": "NVD", "id": "CVE-2021-22676" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-08T00:00:00", "db": "CNVD", "id": "CNVD-2021-59236" }, { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-381113" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22676" }, { "date": "2021-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-459" }, { "date": "2021-08-10T15:15:07.457000", "db": "NVD", "id": "CVE-2021-22676" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-18T00:00:00", "db": "CNVD", "id": "CNVD-2021-59236" }, { "date": "2021-08-17T00:00:00", "db": "VULHUB", "id": "VHN-381113" }, { "date": "2021-08-17T00:00:00", "db": "VULMON", "id": "CVE-2021-22676" }, { "date": "2021-08-10T06:49:00", "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-08-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-459" }, { "date": "2021-08-17T19:39:57.183000", "db": "NVD", "id": "CVE-2021-22676" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-459" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0 Made \u00a0WebAccess/SCADA\u00a0 Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002265" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
var-201906-1029
Vulnerability from variot
In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": null, "trust": 10.5, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=8.3.5" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07" }, { "db": "ZDI", "id": "ZDI-19-599" }, { "db": "ZDI", "id": "ZDI-19-613" }, { "db": "ZDI", "id": "ZDI-19-610" }, { "db": "ZDI", "id": "ZDI-19-616" }, { "db": "ZDI", "id": "ZDI-19-606" }, { "db": "ZDI", "id": "ZDI-19-598" }, { "db": "ZDI", "id": "ZDI-19-609" }, { "db": "ZDI", "id": "ZDI-19-600" }, { "db": "ZDI", "id": "ZDI-19-593" }, { "db": "ZDI", "id": "ZDI-19-615" }, { "db": "ZDI", "id": "ZDI-19-601" }, { "db": "ZDI", "id": "ZDI-19-607" }, { "db": "ZDI", "id": "ZDI-19-597" }, { "db": "ZDI", "id": "ZDI-19-618" }, { "db": "ZDI", "id": "ZDI-19-623" }, { "db": "CNVD", "id": "CNVD-2019-32473" }, { "db": "NVD", "id": "CVE-2019-10993" } ] }, "credits": { "_id": null, "data": "Natnael Samson (@NattiSamson)", "sources": [ { "db": "ZDI", "id": "ZDI-19-599" }, { "db": "ZDI", "id": "ZDI-19-613" }, { "db": "ZDI", "id": "ZDI-19-610" }, { "db": "ZDI", "id": "ZDI-19-616" }, { "db": "ZDI", "id": "ZDI-19-606" }, { "db": "ZDI", "id": "ZDI-19-598" }, { "db": "ZDI", "id": "ZDI-19-609" }, { "db": "ZDI", "id": "ZDI-19-600" }, { "db": "ZDI", "id": "ZDI-19-593" }, { "db": "ZDI", "id": "ZDI-19-615" }, { "db": "ZDI", "id": "ZDI-19-601" }, { "db": "ZDI", "id": "ZDI-19-607" }, { "db": "ZDI", "id": "ZDI-19-597" }, { "db": "ZDI", "id": "ZDI-19-618" } ], "trust": 9.8 }, "cve": "CVE-2019-10993", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-10993", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-32473", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-10993", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 10.5, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-10993", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "ZDI", "id": "CVE-2019-10993", "trust": 10.5, "value": "CRITICAL" }, { "author": "nvd@nist.gov", "id": "CVE-2019-10993", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-32473", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-1077", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07" }, { "db": "ZDI", "id": "ZDI-19-599" }, { "db": "ZDI", "id": "ZDI-19-613" }, { "db": "ZDI", "id": "ZDI-19-610" }, { "db": "ZDI", "id": "ZDI-19-616" }, { "db": "ZDI", "id": "ZDI-19-606" }, { "db": "ZDI", "id": "ZDI-19-598" }, { "db": "ZDI", "id": "ZDI-19-609" }, { "db": "ZDI", "id": "ZDI-19-600" }, { "db": "ZDI", "id": "ZDI-19-593" }, { "db": "ZDI", "id": "ZDI-19-615" }, { "db": "ZDI", "id": "ZDI-19-601" }, { "db": "ZDI", "id": "ZDI-19-607" }, { "db": "ZDI", "id": "ZDI-19-597" }, { "db": "ZDI", "id": "ZDI-19-618" }, { "db": "ZDI", "id": "ZDI-19-623" }, { "db": "CNVD", "id": "CNVD-2019-32473" }, { "db": "CNNVD", "id": "CNNVD-201906-1077" }, { "db": "NVD", "id": "CVE-2019-10993" } ] }, "description": { "_id": null, "data": "In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2019-10993" }, { "db": "ZDI", "id": "ZDI-19-599" }, { "db": "ZDI", "id": "ZDI-19-623" }, { "db": "ZDI", "id": "ZDI-19-618" }, { "db": "ZDI", "id": "ZDI-19-597" }, { "db": "ZDI", "id": "ZDI-19-607" }, { "db": "ZDI", "id": "ZDI-19-601" }, { "db": "ZDI", "id": "ZDI-19-615" }, { "db": "ZDI", "id": "ZDI-19-593" }, { "db": "ZDI", "id": "ZDI-19-600" }, { "db": "ZDI", "id": "ZDI-19-609" }, { "db": "ZDI", "id": "ZDI-19-598" }, { "db": "ZDI", "id": "ZDI-19-606" }, { "db": "ZDI", "id": "ZDI-19-616" }, { "db": "ZDI", "id": "ZDI-19-610" }, { "db": "ZDI", "id": "ZDI-19-613" }, { "db": "CNVD", "id": "CNVD-2019-32473" }, { "db": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07" } ], "trust": 11.07 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2019-10993", "trust": 12.9 }, { "db": "ZDI", "id": "ZDI-19-613", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-616", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-606", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-598", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-615", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-601", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-607", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-597", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-618", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-623", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-19-612", "trust": 1.6 }, { "db": "ZDI", "id": "ZDI-19-603", "trust": 1.6 }, { "db": "ZDI", "id": "ZDI-19-614", "trust": 1.6 }, { "db": "ZDI", "id": "ZDI-19-602", "trust": 1.6 }, { "db": "ZDI", "id": "ZDI-19-617", "trust": 1.6 }, { "db": "ZDI", "id": "ZDI-19-605", "trust": 1.6 }, { "db": "ZDI", "id": "ZDI-19-611", "trust": 1.6 }, { "db": "ICS CERT", "id": "ICSA-19-178-05", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2019-32473", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-1077", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8129", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-599", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8146", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8143", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-610", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8150", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8139", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8128", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8142", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-609", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8130", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-600", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8116", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-593", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8148", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8133", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8140", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8127", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8152", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8119", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2350", "trust": 0.6 }, { "db": "BID", "id": "108923", "trust": 0.6 }, { "db": "IVD", "id": "D5DCD84F-1ACA-4DC3-AC16-D5C7C3DD4D07", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07" }, { "db": "ZDI", "id": "ZDI-19-599" }, { "db": "ZDI", "id": "ZDI-19-613" }, { "db": "ZDI", "id": "ZDI-19-610" }, { "db": "ZDI", "id": "ZDI-19-616" }, { "db": "ZDI", "id": "ZDI-19-606" }, { "db": "ZDI", "id": "ZDI-19-598" }, { "db": "ZDI", "id": "ZDI-19-609" }, { "db": "ZDI", "id": "ZDI-19-600" }, { "db": "ZDI", "id": "ZDI-19-593" }, { "db": "ZDI", "id": "ZDI-19-615" }, { "db": "ZDI", "id": "ZDI-19-601" }, { "db": "ZDI", "id": "ZDI-19-607" }, { "db": "ZDI", "id": "ZDI-19-597" }, { "db": "ZDI", "id": "ZDI-19-618" }, { "db": "ZDI", "id": "ZDI-19-623" }, { "db": "CNVD", "id": "CNVD-2019-32473" }, { "db": "CNNVD", "id": "CNNVD-201906-1077" }, { "db": "NVD", "id": "CVE-2019-10993" } ] }, "id": "VAR-201906-1029", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07" }, { "db": "CNVD", "id": "CNVD-2019-32473" } ], "trust": 1.34667458 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07" }, { "db": "CNVD", "id": "CNVD-2019-32473" } ] }, "last_update_date": "2024-11-29T22:51:20.239000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 10.5, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "title": "Patch for Advantech WebAccess/SCADA arbitrary code execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181487" }, { "title": "Advantech WebAccess/SCADA Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94180" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-599" }, { "db": "ZDI", "id": "ZDI-19-613" }, { "db": "ZDI", "id": "ZDI-19-610" }, { "db": "ZDI", "id": "ZDI-19-616" }, { "db": "ZDI", "id": "ZDI-19-606" }, { "db": "ZDI", "id": "ZDI-19-598" }, { "db": "ZDI", "id": "ZDI-19-609" }, { "db": "ZDI", "id": "ZDI-19-600" }, { "db": "ZDI", "id": "ZDI-19-593" }, { "db": "ZDI", "id": "ZDI-19-615" }, { "db": "ZDI", "id": "ZDI-19-601" }, { "db": "ZDI", "id": "ZDI-19-607" }, { "db": "ZDI", "id": "ZDI-19-597" }, { "db": "ZDI", "id": "ZDI-19-618" }, { "db": "ZDI", "id": "ZDI-19-623" }, { "db": "CNVD", "id": "CNVD-2019-32473" }, { "db": "CNNVD", "id": "CNNVD-201906-1077" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-119", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2019-10993" } ] }, "references": { "_id": null, "data": [ { "trust": 12.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "trust": 2.2, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-623/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-597/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-611/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-601/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-612/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-598/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-615/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-605/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-616/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-602/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-613/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-603/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-614/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-606/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-617/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-607/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-618/" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10993" }, { "trust": 0.6, "url": "http://webaccess.advantech.com" }, { "trust": 0.6, "url": "https://www.securityfocus.com/bid/108923" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2350/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-599" }, { "db": "ZDI", "id": "ZDI-19-613" }, { "db": "ZDI", "id": "ZDI-19-610" }, { "db": "ZDI", "id": "ZDI-19-616" }, { "db": "ZDI", "id": "ZDI-19-606" }, { "db": "ZDI", "id": "ZDI-19-598" }, { "db": "ZDI", "id": "ZDI-19-609" }, { "db": "ZDI", "id": "ZDI-19-600" }, { "db": "ZDI", "id": "ZDI-19-593" }, { "db": "ZDI", "id": "ZDI-19-615" }, { "db": "ZDI", "id": "ZDI-19-601" }, { "db": "ZDI", "id": "ZDI-19-607" }, { "db": "ZDI", "id": "ZDI-19-597" }, { "db": "ZDI", "id": "ZDI-19-618" }, { "db": "ZDI", "id": "ZDI-19-623" }, { "db": "CNVD", "id": "CNVD-2019-32473" }, { "db": "CNNVD", "id": "CNNVD-201906-1077" }, { "db": "NVD", "id": "CVE-2019-10993" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07", "ident": null }, { "db": "ZDI", "id": "ZDI-19-599", "ident": null }, { "db": "ZDI", "id": "ZDI-19-613", "ident": null }, { "db": "ZDI", "id": "ZDI-19-610", "ident": null }, { "db": "ZDI", "id": "ZDI-19-616", "ident": null }, { "db": "ZDI", "id": "ZDI-19-606", "ident": null }, { "db": "ZDI", "id": "ZDI-19-598", "ident": null }, { "db": "ZDI", "id": "ZDI-19-609", "ident": null }, { "db": "ZDI", "id": "ZDI-19-600", "ident": null }, { "db": "ZDI", "id": "ZDI-19-593", "ident": null }, { "db": "ZDI", "id": "ZDI-19-615", "ident": null }, { "db": "ZDI", "id": "ZDI-19-601", "ident": null }, { "db": "ZDI", "id": "ZDI-19-607", "ident": null }, { "db": "ZDI", "id": "ZDI-19-597", "ident": null }, { "db": "ZDI", "id": "ZDI-19-618", "ident": null }, { "db": "ZDI", "id": "ZDI-19-623", "ident": null }, { "db": "CNVD", "id": "CNVD-2019-32473", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201906-1077", "ident": null }, { "db": "NVD", "id": "CVE-2019-10993", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-599", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-613", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-610", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-616", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-606", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-598", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-609", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-600", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-593", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-615", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-601", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-607", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-597", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-618", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-623", "ident": null }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32473", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1077", "ident": null }, { "date": "2019-06-28T21:15:11.353000", "db": "NVD", "id": "CVE-2019-10993", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-599", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-613", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-610", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-616", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-606", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-598", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-609", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-600", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-593", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-615", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-601", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-607", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-597", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-618", "ident": null }, { "date": "2024-01-19T00:00:00", "db": "ZDI", "id": "ZDI-19-623", "ident": null }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32473", "ident": null }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1077", "ident": null }, { "date": "2024-11-21T04:20:18.740000", "db": "NVD", "id": "CVE-2019-10993", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-1077" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA Arbitrary code execution vulnerability", "sources": [ { "db": "IVD", "id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07" }, { "db": "CNVD", "id": "CNVD-2019-32473" } ], "trust": 0.8 }, "type": { "_id": null, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-1077" } ], "trust": 0.6 } }
var-202104-0340
Vulnerability from variot
Incorrect permissions are set to default on the ‘Project Management’ page of WebAccess/SCADA portal of WebAccess/SCADA Versions 9.0.1 and prior, which may allow a low-privileged user to update an administrator’s password and login as an administrator to escalate privileges on the system. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Advantech WebAccess/SCADA-IIoT is a web application developed by Advantech, Taiwan, China. There is a security vulnerability in WebAccess SCADA
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-0340", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "lte", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "versions 9.0.1 and earlier" }, { "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-28788" }, { "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "db": "NVD", "id": "CVE-2021-22669" } ] }, "cve": "CVE-2021-22669", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-22669", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2021-28788", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-381106", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-22669", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001370", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22669", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001370", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-28788", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-980", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-381106", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22669", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-28788" }, { "db": "VULHUB", "id": "VHN-381106" }, { "db": "VULMON", "id": "CVE-2021-22669" }, { "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-980" }, { "db": "NVD", "id": "CVE-2021-22669" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Incorrect permissions are set to default on the \u2018Project Management\u2019 page of WebAccess/SCADA portal of WebAccess/SCADA Versions 9.0.1 and prior, which may allow a low-privileged user to update an administrator\u2019s password and login as an administrator to escalate privileges on the system. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Advantech WebAccess/SCADA-IIoT is a web application developed by Advantech, Taiwan, China. There is a security vulnerability in WebAccess SCADA", "sources": [ { "db": "NVD", "id": "CVE-2021-22669" }, { "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "db": "CNVD", "id": "CNVD-2021-28788" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-381106" }, { "db": "VULMON", "id": "CVE-2021-22669" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22669", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-21-103-02", "trust": 3.2 }, { "db": "JVN", "id": "JVNVU99008843", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001370", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-28788", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1248", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021041404", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-980", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-381106", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22669", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-28788" }, { "db": "VULHUB", "id": "VHN-381106" }, { "db": "VULMON", "id": "CVE-2021-22669" }, { "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-980" }, { "db": "NVD", "id": "CVE-2021-22669" } ] }, "id": "VAR-202104-0340", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-28788" }, { "db": "VULHUB", "id": "VHN-381106" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-28788" } ] }, "last_update_date": "2024-11-23T21:22:31.959000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.com/support/details/installation?id=1-MS9MJV#" }, { "title": "Patch for Advantech WebAccess/SCADA Critical Resource Authority Assignment Incorrect Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/258981" }, { "title": "Advantech WebAccess SCADA Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=149709" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-28788" }, { "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "db": "CNNVD", "id": "CNNVD-202104-980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-732", "trust": 1.1 }, { "problemtype": "Improper permission assignment for critical resources (CWE-732) [IPA Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381106" }, { "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "db": "NVD", "id": "CVE-2021-22669" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-02" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu99008843" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22669" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041404" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1248" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/732.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-28788" }, { "db": "VULHUB", "id": "VHN-381106" }, { "db": "VULMON", "id": "CVE-2021-22669" }, { "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-980" }, { "db": "NVD", "id": "CVE-2021-22669" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-28788" }, { "db": "VULHUB", "id": "VHN-381106" }, { "db": "VULMON", "id": "CVE-2021-22669" }, { "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-980" }, { "db": "NVD", "id": "CVE-2021-22669" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-16T00:00:00", "db": "CNVD", "id": "CNVD-2021-28788" }, { "date": "2021-04-26T00:00:00", "db": "VULHUB", "id": "VHN-381106" }, { "date": "2021-04-26T00:00:00", "db": "VULMON", "id": "CVE-2021-22669" }, { "date": "2021-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-980" }, { "date": "2021-04-26T19:15:08.417000", "db": "NVD", "id": "CVE-2021-22669" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2021-28788" }, { "date": "2021-05-07T00:00:00", "db": "VULHUB", "id": "VHN-381106" }, { "date": "2021-05-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22669" }, { "date": "2021-04-15T06:48:00", "db": "JVNDB", "id": "JVNDB-2021-001370" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-05-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-980" }, { "date": "2024-11-21T05:50:26.640000", "db": "NVD", "id": "CVE-2021-22669" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-980" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0 Made \u00a0WebAccess/SCADA\u00a0 Improper allocation of access to important information", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001370" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-980" } ], "trust": 1.2 } }
var-202006-1904
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability, which can be exploited by an attacker to delete arbitrary files on the server.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1904", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29405" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-29405", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-29405", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29405" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability, which can be exploited by an attacker to delete arbitrary files on the server.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29405" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29405", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29405" } ] }, "id": "VAR-202006-1904", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-29405" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29405" } ] }, "last_update_date": "2022-05-04T10:21:35.753000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA BwFLApp file has system command injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/216131" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29405" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29405" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-11T00:00:00", "db": "CNVD", "id": "CNVD-2020-29405" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-29405" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has arbitrary file deletion vulnerability (CNVD-2020-29405)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29405" } ], "trust": 0.6 } }
var-202008-1295
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain remote connection passwords, background administrator passwords and other sensitive information.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1295", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48622" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2020-48622", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48622", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48622" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain remote connection passwords, background administrator passwords and other sensitive information.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48622" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48622", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48622" } ] }, "id": "VAR-202008-1295", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48622" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48622" } ] }, "last_update_date": "2022-05-04T09:28:01.837000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control FileSystemObject class MoveFile member has an information disclosure vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225691" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48622" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48622" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48622" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48622" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an information disclosure vulnerability (CNVD-2020-48622)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48622" } ], "trust": 0.6 } }
var-202008-1296
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has logic flaws. Attackers can use the vulnerability to access and modify the registry of the user's system, and can execute arbitrary commands on the user's system.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1296", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48617" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2020-48617", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48617", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48617" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has logic flaws. Attackers can use the vulnerability to access and modify the registry of the user\u0027s system, and can execute arbitrary commands on the user\u0027s system.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48617" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48617", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48617" } ] }, "id": "VAR-202008-1296", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48617" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48617" } ] }, "last_update_date": "2022-05-04T09:38:05.588000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control IWshShell_Class class RegWrite member has logic defect vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225713" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48617" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48617" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48617" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48617" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has logic flaw vulnerability (CNVD-2020-48617)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48617" } ], "trust": 0.6 } }
var-201801-1493
Vulnerability from variot
A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. WebAccess/SCADA does not properly sanitize its inputs for SQL commands. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the user parameter in chkLogin2.asp. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the database. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess node", "scope": null, "trust": 1.4, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess\\/scada", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "8.2_20170817" }, { "_id": null, "model": "webaccess/scada", "scope": "lt", "trust": 0.8, "vendor": "advantech", "version": "8.2_20170817" }, { "_id": null, "model": "webaccess/scada \u003cv8.2 20170817", "scope": null, "trust": 0.6, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.1" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.0" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "7.2" }, { "_id": null, "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.3" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess scada", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-144" }, { "db": "ZDI", "id": "ZDI-18-143" }, { "db": "CNVD", "id": "CNVD-2018-01710" }, { "db": "BID", "id": "102781" }, { "db": "JVNDB", "id": "JVNDB-2018-001574" }, { "db": "NVD", "id": "CVE-2018-5443" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-001574" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-144" }, { "db": "ZDI", "id": "ZDI-18-143" } ], "trust": 1.4 }, "cve": "CVE-2018-5443", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-5443", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 3.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-01710", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-135474", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2018-5443", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2018-5443", "trust": 1.4, "value": "MEDIUM" }, { "author": "nvd@nist.gov", "id": "CVE-2018-5443", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-5443", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2018-01710", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201801-959", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-135474", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-144" }, { "db": "ZDI", "id": "ZDI-18-143" }, { "db": "CNVD", "id": "CNVD-2018-01710" }, { "db": "VULHUB", "id": "VHN-135474" }, { "db": "JVNDB", "id": "JVNDB-2018-001574" }, { "db": "CNNVD", "id": "CNNVD-201801-959" }, { "db": "NVD", "id": "CVE-2018-5443" } ] }, "description": { "_id": null, "data": "A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. WebAccess/SCADA does not properly sanitize its inputs for SQL commands. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the user parameter in chkLogin2.asp. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the database. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2018-5443" }, { "db": "JVNDB", "id": "JVNDB-2018-001574" }, { "db": "ZDI", "id": "ZDI-18-144" }, { "db": "ZDI", "id": "ZDI-18-143" }, { "db": "CNVD", "id": "CNVD-2018-01710" }, { "db": "BID", "id": "102781" }, { "db": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-135474" } ], "trust": 3.96 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-5443", "trust": 5.0 }, { "db": "ICS CERT", "id": "ICSA-18-023-01", "trust": 3.4 }, { "db": "BID", "id": "102781", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201801-959", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2018-01710", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-001574", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5503", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-144", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5502", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-143", "trust": 0.7 }, { "db": "IVD", "id": "E2E2B550-39AB-11E9-BB92-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-135474", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-144" }, { "db": "ZDI", "id": "ZDI-18-143" }, { "db": "CNVD", "id": "CNVD-2018-01710" }, { "db": "VULHUB", "id": "VHN-135474" }, { "db": "BID", "id": "102781" }, { "db": "JVNDB", "id": "JVNDB-2018-001574" }, { "db": "CNNVD", "id": "CNNVD-201801-959" }, { "db": "NVD", "id": "CVE-2018-5443" } ] }, "id": "VAR-201801-1493", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-01710" }, { "db": "VULHUB", "id": "VHN-135474" } ], "trust": 1.6679344999999999 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-01710" } ] }, "last_update_date": "2024-11-23T22:34:24.880000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-023-01" }, { "title": "WebAccess/SCADA", "trust": 0.8, "url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada" }, { "title": "Patch for Advantech WebAccess/SCADA SQL Injection Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/114217" }, { "title": "Advantech WebAccess/SCADA SQL Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=78083" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-144" }, { "db": "ZDI", "id": "ZDI-18-143" }, { "db": "CNVD", "id": "CNVD-2018-01710" }, { "db": "JVNDB", "id": "JVNDB-2018-001574" }, { "db": "CNNVD", "id": "CNNVD-201801-959" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-89", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135474" }, { "db": "JVNDB", "id": "JVNDB-2018-001574" }, { "db": "NVD", "id": "CVE-2018-5443" } ] }, "references": { "_id": null, "data": [ { "trust": 4.2, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-01" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/102781" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5443" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5443" }, { "trust": 0.6, "url": "https://www.proxyit.cc/advisories/icsa-18-023-01" }, { "trust": 0.3, "url": "http://www.advantech.in/" }, { "trust": 0.3, "url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-144" }, { "db": "ZDI", "id": "ZDI-18-143" }, { "db": "CNVD", "id": "CNVD-2018-01710" }, { "db": "VULHUB", "id": "VHN-135474" }, { "db": "BID", "id": "102781" }, { "db": "JVNDB", "id": "JVNDB-2018-001574" }, { "db": "CNNVD", "id": "CNNVD-201801-959" }, { "db": "NVD", "id": "CVE-2018-5443" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-144", "ident": null }, { "db": "ZDI", "id": "ZDI-18-143", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-01710", "ident": null }, { "db": "VULHUB", "id": "VHN-135474", "ident": null }, { "db": "BID", "id": "102781", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-001574", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201801-959", "ident": null }, { "db": "NVD", "id": "CVE-2018-5443", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-01-24T00:00:00", "db": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1", "ident": null }, { "date": "2018-02-06T00:00:00", "db": "ZDI", "id": "ZDI-18-144", "ident": null }, { "date": "2018-02-06T00:00:00", "db": "ZDI", "id": "ZDI-18-143", "ident": null }, { "date": "2018-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2018-01710", "ident": null }, { "date": "2018-01-25T00:00:00", "db": "VULHUB", "id": "VHN-135474", "ident": null }, { "date": "2018-01-23T00:00:00", "db": "BID", "id": "102781", "ident": null }, { "date": "2018-02-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001574", "ident": null }, { "date": "2018-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-959", "ident": null }, { "date": "2018-01-25T03:29:00.320000", "db": "NVD", "id": "CVE-2018-5443", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-02-06T00:00:00", "db": "ZDI", "id": "ZDI-18-144", "ident": null }, { "date": "2018-02-06T00:00:00", "db": "ZDI", "id": "ZDI-18-143", "ident": null }, { "date": "2018-01-24T00:00:00", "db": "CNVD", "id": "CNVD-2018-01710", "ident": null }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-135474", "ident": null }, { "date": "2018-01-23T00:00:00", "db": "BID", "id": "102781", "ident": null }, { "date": "2018-02-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001574", "ident": null }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-959", "ident": null }, { "date": "2024-11-21T04:08:48.940000", "db": "NVD", "id": "CVE-2018-5443", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201801-959" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA SQL Injection Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2018-01710" }, { "db": "CNNVD", "id": "CNNVD-201801-959" } ], "trust": 1.2 }, "type": { "_id": null, "data": "SQL injection", "sources": [ { "db": "IVD", "id": "e2e2b550-39ab-11e9-bb92-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201801-959" } ], "trust": 0.8 } }
var-202306-0131
Vulnerability from variot
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment. This vulnerability is caused by the application's lack of effective verification of uploaded files
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202306-0131", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "9.1.3" }, { "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=9.1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15543" }, { "db": "NVD", "id": "CVE-2023-22450" } ] }, "cve": "CVE-2023-22450", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2024-15543", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2023-22450", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-22450", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2023-22450", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2024-15543", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202306-084", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15543" }, { "db": "CNNVD", "id": "CNNVD-202306-084" }, { "db": "NVD", "id": "CVE-2023-22450" }, { "db": "NVD", "id": "CVE-2023-22450" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\n\n\nIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment. This vulnerability is caused by the application\u0027s lack of effective verification of uploaded files", "sources": [ { "db": "NVD", "id": "CVE-2023-22450" }, { "db": "CNVD", "id": "CNVD-2024-15543" }, { "db": "VULMON", "id": "CVE-2023-22450" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-22450", "trust": 2.3 }, { "db": "ICS CERT", "id": "ICSA-23-152-01", "trust": 1.7 }, { "db": "AUSCERT", "id": "ESB-2023.3138", "trust": 1.2 }, { "db": "CNVD", "id": "CNVD-2024-15543", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202306-084", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2023-22450", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15543" }, { "db": "VULMON", "id": "CVE-2023-22450" }, { "db": "CNNVD", "id": "CNNVD-202306-084" }, { "db": "NVD", "id": "CVE-2023-22450" } ] }, "id": "VAR-202306-0131", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-15543" } ], "trust": 1.2586422 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15543" } ] }, "last_update_date": "2024-08-14T14:43:12.428000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Advantech WebAccess/SCADA Arbitrary File Upload Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/537526" }, { "title": "Advantech WebAccess/SCADA Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=240434" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15543" }, { "db": "CNNVD", "id": "CNNVD-202306-084" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-434", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2023-22450" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01" }, { "trust": 1.2, "url": "https://www.auscert.org.au/bulletins/esb-2023.3138" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2023-22450/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-22450" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/434.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15543" }, { "db": "VULMON", "id": "CVE-2023-22450" }, { "db": "CNNVD", "id": "CNNVD-202306-084" }, { "db": "NVD", "id": "CVE-2023-22450" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-15543" }, { "db": "VULMON", "id": "CVE-2023-22450" }, { "db": "CNNVD", "id": "CNNVD-202306-084" }, { "db": "NVD", "id": "CVE-2023-22450" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2024-15543" }, { "date": "2023-06-06T00:00:00", "db": "VULMON", "id": "CVE-2023-22450" }, { "date": "2023-06-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-084" }, { "date": "2023-06-06T00:15:09.310000", "db": "NVD", "id": "CVE-2023-22450" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2024-15543" }, { "date": "2023-06-06T00:00:00", "db": "VULMON", "id": "CVE-2023-22450" }, { "date": "2023-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-084" }, { "date": "2023-06-12T16:56:27.357000", "db": "NVD", "id": "CVE-2023-22450" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-084" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA Arbitrary File Upload Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2024-15543" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-084" } ], "trust": 0.6 } }
var-201904-0333
Vulnerability from variot
Advantech WebAccess 8.3.4 is vulnerable to file upload attacks via unauthenticated RPC call. An unauthenticated, remote attacker can use this vulnerability to execute arbitrary code. Advantech WebAccess Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a browser-based HMI/SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. An arbitrary file-download vulnerability 2. This may aid in further attacks. Advantech WebAccess 8.3.4 is vulnerable; other versions may also be affected. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0333", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess", "scope": "eq", "trust": 2.4, "vendor": "advantech", "version": "8.3.4" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "8.3.4" } ], "sources": [ { "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "db": "CNVD", "id": "CNVD-2019-32474" }, { "db": "BID", "id": "107847" }, { "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "db": "NVD", "id": "CVE-2019-3940" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:advantech_webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003313" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tenable", "sources": [ { "db": "BID", "id": "107847" }, { "db": "CNNVD", "id": "CNNVD-201904-485" } ], "trust": 0.9 }, "cve": "CVE-2019-3940", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-3940", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-32474", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-155375", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-3940", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-3940", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-3940", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-32474", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201904-485", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-155375", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-3940", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "db": "CNVD", "id": "CNVD-2019-32474" }, { "db": "VULHUB", "id": "VHN-155375" }, { "db": "VULMON", "id": "CVE-2019-3940" }, { "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "db": "CNNVD", "id": "CNNVD-201904-485" }, { "db": "NVD", "id": "CVE-2019-3940" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess 8.3.4 is vulnerable to file upload attacks via unauthenticated RPC call. An unauthenticated, remote attacker can use this vulnerability to execute arbitrary code. Advantech WebAccess Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a browser-based HMI/SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities:\n1. An arbitrary file-download vulnerability\n2. This may aid in further attacks. \nAdvantech WebAccess 8.3.4 is vulnerable; other versions may also be affected. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products", "sources": [ { "db": "NVD", "id": "CVE-2019-3940" }, { "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "db": "CNVD", "id": "CNVD-2019-32474" }, { "db": "BID", "id": "107847" }, { "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "db": "VULHUB", "id": "VHN-155375" }, { "db": "VULMON", "id": "CVE-2019-3940" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-3940", "trust": 3.7 }, { "db": "TENABLE", "id": "TRA-2019-15", "trust": 3.5 }, { "db": "BID", "id": "107847", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201904-485", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32474", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-003313", "trust": 0.8 }, { "db": "IVD", "id": "ED3F090D-7F3E-4836-870E-ACC7E4660EF3", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-155375", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-3940", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "db": "CNVD", "id": "CNVD-2019-32474" }, { "db": "VULHUB", "id": "VHN-155375" }, { "db": "VULMON", "id": "CVE-2019-3940" }, { "db": "BID", "id": "107847" }, { "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "db": "CNNVD", "id": "CNNVD-201904-485" }, { "db": "NVD", "id": "CVE-2019-3940" } ] }, "id": "VAR-201904-0333", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "db": "CNVD", "id": "CNVD-2019-32474" }, { "db": "VULHUB", "id": "VHN-155375" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "db": "CNVD", "id": "CNVD-2019-32474" } ] }, "last_update_date": "2024-11-23T22:12:06.937000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Patch for Advantech WebAccess Code Issue Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181481" }, { "title": "Advantech WebAccess Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91310" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32474" }, { "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "db": "CNNVD", "id": "CNNVD-201904-485" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-434", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-155375" }, { "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "db": "NVD", "id": "CVE-2019-3940" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "https://www.tenable.com/security/research/tra-2019-15" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/107847" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3940" }, { "trust": 0.9, "url": "http://webaccess.advantech.com" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3940" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/434.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32474" }, { "db": "VULHUB", "id": "VHN-155375" }, { "db": "VULMON", "id": "CVE-2019-3940" }, { "db": "BID", "id": "107847" }, { "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "db": "CNNVD", "id": "CNNVD-201904-485" }, { "db": "NVD", "id": "CVE-2019-3940" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "db": "CNVD", "id": "CNVD-2019-32474" }, { "db": "VULHUB", "id": "VHN-155375" }, { "db": "VULMON", "id": "CVE-2019-3940" }, { "db": "BID", "id": "107847" }, { "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "db": "CNNVD", "id": "CNNVD-201904-485" }, { "db": "NVD", "id": "CVE-2019-3940" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32474" }, { "date": "2019-04-09T00:00:00", "db": "VULHUB", "id": "VHN-155375" }, { "date": "2019-04-09T00:00:00", "db": "VULMON", "id": "CVE-2019-3940" }, { "date": "2019-04-03T00:00:00", "db": "BID", "id": "107847" }, { "date": "2019-05-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "date": "2019-04-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-485" }, { "date": "2019-04-09T16:29:02.100000", "db": "NVD", "id": "CVE-2019-3940" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32474" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-155375" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2019-3940" }, { "date": "2019-04-03T00:00:00", "db": "BID", "id": "107847" }, { "date": "2019-05-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003313" }, { "date": "2019-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-485" }, { "date": "2024-11-21T04:42:54.547000", "db": "NVD", "id": "CVE-2019-3940" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-485" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess Code Issue Vulnerability", "sources": [ { "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "db": "CNVD", "id": "CNVD-2019-32474" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Code problem", "sources": [ { "db": "IVD", "id": "ed3f090d-7f3e-4836-870e-acc7e4660ef3" }, { "db": "CNNVD", "id": "CNNVD-201904-485" } ], "trust": 0.8 } }
var-202006-1903
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability, which can be exploited by an attacker to delete arbitrary files on the server.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1903", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29403" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-29403", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-29403", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29403" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability, which can be exploited by an attacker to delete arbitrary files on the server.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29403" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29403", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29403" } ] }, "id": "VAR-202006-1903", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-29403" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29403" } ] }, "last_update_date": "2022-05-04T09:42:25.766000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA bwtalk4.exe file has system command injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/216135" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29403" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29403" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-11T00:00:00", "db": "CNVD", "id": "CNVD-2020-29403" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-29403" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has arbitrary file deletion vulnerability (CNVD-2020-29403)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29403" } ], "trust": 0.6 } }
var-201906-1028
Vulnerability from variot
In WebAccess/SCADA, Versions 8.3.5 and prior, multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x271C IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. Multiple heap-based buffer-overflow vulnerabilities 4. An information disclosure vulnerability 5. Multiple remote-code execution vulnerabilities An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (â??../â??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. Advantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": null, "trust": 4.9, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.8, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.1" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.0" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "7.2" }, { "_id": null, "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.4.1" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4" }, { "db": "ZDI", "id": "ZDI-19-620" }, { "db": "ZDI", "id": "ZDI-19-586" }, { "db": "ZDI", "id": "ZDI-19-588" }, { "db": "ZDI", "id": "ZDI-19-589" }, { "db": "ZDI", "id": "ZDI-19-592" }, { "db": "ZDI", "id": "ZDI-19-594" }, { "db": "ZDI", "id": "ZDI-19-619" }, { "db": "CNVD", "id": "CNVD-2019-32472" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005813" }, { "db": "NVD", "id": "CVE-2019-10991" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005813" } ] }, "credits": { "_id": null, "data": "Mat Powell of Trend Micro Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-19-620" }, { "db": "ZDI", "id": "ZDI-19-588" }, { "db": "ZDI", "id": "ZDI-19-589" }, { "db": "ZDI", "id": "ZDI-19-592" }, { "db": "ZDI", "id": "ZDI-19-619" } ], "trust": 3.5 }, "cve": "CVE-2019-10991", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-10991", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-32472", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "917426ff-7065-403b-bd4d-431e7d3751d4", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-142593", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-10991", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 4.9, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-10991", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-10991", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2019-10991", "trust": 4.9, "value": "CRITICAL" }, { "author": "nvd@nist.gov", "id": "CVE-2019-10991", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-10991", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-32472", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-1075", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-142593", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4" }, { "db": "ZDI", "id": "ZDI-19-620" }, { "db": "ZDI", "id": "ZDI-19-586" }, { "db": "ZDI", "id": "ZDI-19-588" }, { "db": "ZDI", "id": "ZDI-19-589" }, { "db": "ZDI", "id": "ZDI-19-592" }, { "db": "ZDI", "id": "ZDI-19-594" }, { "db": "ZDI", "id": "ZDI-19-619" }, { "db": "CNVD", "id": "CNVD-2019-32472" }, { "db": "VULHUB", "id": "VHN-142593" }, { "db": "JVNDB", "id": "JVNDB-2019-005813" }, { "db": "CNNVD", "id": "CNNVD-201906-1075" }, { "db": "NVD", "id": "CVE-2019-10991" } ] }, "description": { "_id": null, "data": "In WebAccess/SCADA, Versions 8.3.5 and prior, multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x271C IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities:\n1. A directory-traversal vulnerability\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. Multiple heap-based buffer-overflow vulnerabilities\n4. An information disclosure vulnerability\n5. Multiple remote-code execution vulnerabilities\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (\u00e2??../\u00e2??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. \nAdvantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2019-10991" }, { "db": "JVNDB", "id": "JVNDB-2019-005813" }, { "db": "ZDI", "id": "ZDI-19-620" }, { "db": "ZDI", "id": "ZDI-19-586" }, { "db": "ZDI", "id": "ZDI-19-588" }, { "db": "ZDI", "id": "ZDI-19-589" }, { "db": "ZDI", "id": "ZDI-19-592" }, { "db": "ZDI", "id": "ZDI-19-594" }, { "db": "ZDI", "id": "ZDI-19-619" }, { "db": "CNVD", "id": "CNVD-2019-32472" }, { "db": "BID", "id": "108923" }, { "db": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4" }, { "db": "VULHUB", "id": "VHN-142593" } ], "trust": 7.11 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2019-10991", "trust": 8.5 }, { "db": "ICS CERT", "id": "ICSA-19-178-05", "trust": 2.8 }, { "db": "ZDI", "id": "ZDI-19-620", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-19-586", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-19-588", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-19-589", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-19-592", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-19-594", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-19-619", "trust": 2.4 }, { "db": "CNNVD", "id": "CNNVD-201906-1075", "trust": 0.9 }, { "db": "BID", "id": "108923", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32472", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-005813", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8191", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7951", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8063", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8064", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-7906", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8117", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8189", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2350", "trust": 0.6 }, { "db": "IVD", "id": "917426FF-7065-403B-BD4D-431E7D3751D4", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-142593", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4" }, { "db": "ZDI", "id": "ZDI-19-620" }, { "db": "ZDI", "id": "ZDI-19-586" }, { "db": "ZDI", "id": "ZDI-19-588" }, { "db": "ZDI", "id": "ZDI-19-589" }, { "db": "ZDI", "id": "ZDI-19-592" }, { "db": "ZDI", "id": "ZDI-19-594" }, { "db": "ZDI", "id": "ZDI-19-619" }, { "db": "CNVD", "id": "CNVD-2019-32472" }, { "db": "VULHUB", "id": "VHN-142593" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005813" }, { "db": "CNNVD", "id": "CNNVD-201906-1075" }, { "db": "NVD", "id": "CVE-2019-10991" } ] }, "id": "VAR-201906-1028", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4" }, { "db": "CNVD", "id": "CNVD-2019-32472" }, { "db": "VULHUB", "id": "VHN-142593" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4" }, { "db": "CNVD", "id": "CNVD-2019-32472" } ] }, "last_update_date": "2024-11-23T21:52:09.434000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 4.9, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-32472)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181485" }, { "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94178" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-620" }, { "db": "ZDI", "id": "ZDI-19-586" }, { "db": "ZDI", "id": "ZDI-19-588" }, { "db": "ZDI", "id": "ZDI-19-589" }, { "db": "ZDI", "id": "ZDI-19-592" }, { "db": "ZDI", "id": "ZDI-19-594" }, { "db": "ZDI", "id": "ZDI-19-619" }, { "db": "CNVD", "id": "CNVD-2019-32472" }, { "db": "JVNDB", "id": "JVNDB-2019-005813" }, { "db": "CNNVD", "id": "CNNVD-201906-1075" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142593" }, { "db": "JVNDB", "id": "JVNDB-2019-005813" }, { "db": "NVD", "id": "CVE-2019-10991" } ] }, "references": { "_id": null, "data": [ { "trust": 7.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-620/" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10991" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-586/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-588/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-589/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-592/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-594/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-619/" }, { "trust": 0.9, "url": "http://webaccess.advantech.com" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10991" }, { "trust": 0.6, "url": "https://www.securityfocus.com/bid/108923" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2350/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-620" }, { "db": "ZDI", "id": "ZDI-19-586" }, { "db": "ZDI", "id": "ZDI-19-588" }, { "db": "ZDI", "id": "ZDI-19-589" }, { "db": "ZDI", "id": "ZDI-19-592" }, { "db": "ZDI", "id": "ZDI-19-594" }, { "db": "ZDI", "id": "ZDI-19-619" }, { "db": "CNVD", "id": "CNVD-2019-32472" }, { "db": "VULHUB", "id": "VHN-142593" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005813" }, { "db": "CNNVD", "id": "CNNVD-201906-1075" }, { "db": "NVD", "id": "CVE-2019-10991" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4", "ident": null }, { "db": "ZDI", "id": "ZDI-19-620", "ident": null }, { "db": "ZDI", "id": "ZDI-19-586", "ident": null }, { "db": "ZDI", "id": "ZDI-19-588", "ident": null }, { "db": "ZDI", "id": "ZDI-19-589", "ident": null }, { "db": "ZDI", "id": "ZDI-19-592", "ident": null }, { "db": "ZDI", "id": "ZDI-19-594", "ident": null }, { "db": "ZDI", "id": "ZDI-19-619", "ident": null }, { "db": "CNVD", "id": "CNVD-2019-32472", "ident": null }, { "db": "VULHUB", "id": "VHN-142593", "ident": null }, { "db": "BID", "id": "108923", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2019-005813", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201906-1075", "ident": null }, { "db": "NVD", "id": "CVE-2019-10991", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-620", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-586", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-588", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-589", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-592", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-594", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-619", "ident": null }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32472", "ident": null }, { "date": "2019-06-28T00:00:00", "db": "VULHUB", "id": "VHN-142593", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005813", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1075", "ident": null }, { "date": "2019-06-28T21:15:11.307000", "db": "NVD", "id": "CVE-2019-10991", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-620", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-586", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-588", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-589", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-592", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-594", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-619", "ident": null }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32472", "ident": null }, { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-142593", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005813", "ident": null }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1075", "ident": null }, { "date": "2024-11-21T04:20:18.510000", "db": "NVD", "id": "CVE-2019-10991", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-1075" } ], "trust": 0.6 }, "title": { "_id": null, "data": "WebAccess/SCADA Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005813" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "917426ff-7065-403b-bd4d-431e7d3751d4" }, { "db": "CNNVD", "id": "CNNVD-201906-1075" } ], "trust": 0.8 } }
var-202011-1540
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1540", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58464" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-58464", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-58464", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58464" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58464" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58464", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58464" } ] }, "id": "VAR-202011-1540", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-58464" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58464" } ] }, "last_update_date": "2022-05-04T10:10:46Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58464" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-58464" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-58464" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58464)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58464" } ], "trust": 0.6 } }
var-202005-1246
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x520B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ], "trust": 0.7 }, "cvss": { "_id": null, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "ZDI-20-606", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-606", "trust": 0.7, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "description": { "_id": null, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x520B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.", "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ], "trust": 0.7 }, "external_ids": { "_id": null, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-9935", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-606", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "id": "VAR-202005-1246", "iot": { "_id": null, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6405517 }, "last_update_date": "2022-05-17T01:40:54.071000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "references": { "_id": null, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-20-606", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-606", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-606", "ident": null } ] }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA DATACORE IOCTL 0x520B Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ], "trust": 0.7 } }
var-202008-1301
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1301", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48623" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CNVD-2020-48623", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48623", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48623" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48623" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48623", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48623" } ] }, "id": "VAR-202008-1301", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48623" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48623" } ] }, "last_update_date": "2022-05-04T09:32:45.234000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control FileSystemObject class DeleteFolder member has arbitrary file deletion vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225693" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48623" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48623" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48623" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48623" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-48623)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48623" } ], "trust": 0.6 } }
var-202005-1238
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5208 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202005-1238", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-608" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-608" } ], "trust": 0.7 }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "ZDI-20-608", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-608", "trust": 0.7, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-608" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5208 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.", "sources": [ { "db": "ZDI", "id": "ZDI-20-608" } ], "trust": 0.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-9938", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-608", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-608" } ] }, "id": "VAR-202005-1238", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6405517 }, "last_update_date": "2022-05-17T01:59:53.584000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-608" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-608" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-608" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-608" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-608" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA DATACORE IOCTL 0x5208 Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-608" } ], "trust": 0.7 } }
var-202005-0335
Vulnerability from variot
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791e in DATACORE.exe. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. Advantech WebAccess Node could allow a remote malicious user to traverse directories on the system, caused by improper validation of user request. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to overwrite arbitrary files on the system
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 2.1, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 1.8, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 0.8, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "gte", "trust": 0.6, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "9.0.0" } ], "sources": [ { "db": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287" }, { "db": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f" }, { "db": "ZDI", "id": "ZDI-20-595" }, { "db": "ZDI", "id": "ZDI-20-589" }, { "db": "ZDI", "id": "ZDI-20-605" }, { "db": "CNVD", "id": "CNVD-2020-29743" }, { "db": "JVNDB", "id": "JVNDB-2020-005162" }, { "db": "NVD", "id": "CVE-2020-12006" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005162" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-595" }, { "db": "ZDI", "id": "ZDI-20-589" }, { "db": "ZDI", "id": "ZDI-20-605" } ], "trust": 2.1 }, "cve": "CVE-2020-12006", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-12006", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005162", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-29743", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-164641", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12006", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.1, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12006", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005162", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2020-12006", "trust": 2.1, "value": "CRITICAL" }, { "author": "nvd@nist.gov", "id": "CVE-2020-12006", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-005162", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-29743", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202005-306", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-164641", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-12006", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287" }, { "db": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f" }, { "db": "ZDI", "id": "ZDI-20-595" }, { "db": "ZDI", "id": "ZDI-20-589" }, { "db": "ZDI", "id": "ZDI-20-605" }, { "db": "CNVD", "id": "CNVD-2020-29743" }, { "db": "VULHUB", "id": "VHN-164641" }, { "db": "VULMON", "id": "CVE-2020-12006" }, { "db": "JVNDB", "id": "JVNDB-2020-005162" }, { "db": "CNNVD", "id": "CNNVD-202005-306" }, { "db": "NVD", "id": "CVE-2020-12006" } ] }, "description": { "_id": null, "data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application\u2019s control. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791e in DATACORE.exe. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. Advantech WebAccess Node could allow a remote malicious user to traverse directories on the system, caused by improper validation of user request. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to overwrite arbitrary files on the system", "sources": [ { "db": "NVD", "id": "CVE-2020-12006" }, { "db": "JVNDB", "id": "JVNDB-2020-005162" }, { "db": "ZDI", "id": "ZDI-20-595" }, { "db": "ZDI", "id": "ZDI-20-589" }, { "db": "ZDI", "id": "ZDI-20-605" }, { "db": "CNVD", "id": "CNVD-2020-29743" }, { "db": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287" }, { "db": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f" }, { "db": "VULHUB", "id": "VHN-164641" }, { "db": "VULMON", "id": "CVE-2020-12006" } ], "trust": 4.59 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-12006", "trust": 5.7 }, { "db": "ICS CERT", "id": "ICSA-20-128-01", "trust": 3.2 }, { "db": "ZDI", "id": "ZDI-20-595", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-589", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-605", "trust": 2.5 }, { "db": "CNVD", "id": "CNVD-2020-29743", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-202005-306", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU93292753", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005162", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9905", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9995", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9901", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1646", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47349", "trust": 0.6 }, { "db": "IVD", "id": "EC7B8103-B626-4A4F-985F-BD5BDBB95287", "trust": 0.2 }, { "db": "IVD", "id": "2D8FC349-4A01-4FA6-8792-DDCEAE01196F", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-164641", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-12006", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287" }, { "db": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f" }, { "db": "ZDI", "id": "ZDI-20-595" }, { "db": "ZDI", "id": "ZDI-20-589" }, { "db": "ZDI", "id": "ZDI-20-605" }, { "db": "CNVD", "id": "CNVD-2020-29743" }, { "db": "VULHUB", "id": "VHN-164641" }, { "db": "VULMON", "id": "CVE-2020-12006" }, { "db": "JVNDB", "id": "JVNDB-2020-005162" }, { "db": "CNNVD", "id": "CNNVD-202005-306" }, { "db": "NVD", "id": "CVE-2020-12006" } ] }, "id": "VAR-202005-0335", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287" }, { "db": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f" }, { "db": "CNVD", "id": "CNVD-2020-29743" }, { "db": "VULHUB", "id": "VHN-164641" } ], "trust": 1.679503486666667 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287" }, { "db": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f" }, { "db": "CNVD", "id": "CNVD-2020-29743" } ] }, "last_update_date": "2024-11-23T21:59:18.650000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 2.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.advantech.com/" }, { "title": "Patch for Advantech WebAccess Node Path Traversal Vulnerability (CNVD-2020-29743)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/218853" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-595" }, { "db": "ZDI", "id": "ZDI-20-589" }, { "db": "ZDI", "id": "ZDI-20-605" }, { "db": "CNVD", "id": "CNVD-2020-29743" }, { "db": "JVNDB", "id": "JVNDB-2020-005162" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-22", "trust": 1.9 }, { "problemtype": "CWE-23", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-164641" }, { "db": "JVNDB", "id": "JVNDB-2020-005162" }, { "db": "NVD", "id": "CVE-2020-12006" } ] }, "references": { "_id": null, "data": [ { "trust": 3.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01" }, { "trust": 2.4, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-605/" }, { "trust": 2.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-589/" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-595/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12006" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12006" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93292753/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47349" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1646/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/22.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181598" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-595" }, { "db": "ZDI", "id": "ZDI-20-589" }, { "db": "ZDI", "id": "ZDI-20-605" }, { "db": "CNVD", "id": "CNVD-2020-29743" }, { "db": "VULHUB", "id": "VHN-164641" }, { "db": "VULMON", "id": "CVE-2020-12006" }, { "db": "JVNDB", "id": "JVNDB-2020-005162" }, { "db": "CNNVD", "id": "CNNVD-202005-306" }, { "db": "NVD", "id": "CVE-2020-12006" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287", "ident": null }, { "db": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f", "ident": null }, { "db": "ZDI", "id": "ZDI-20-595", "ident": null }, { "db": "ZDI", "id": "ZDI-20-589", "ident": null }, { "db": "ZDI", "id": "ZDI-20-605", "ident": null }, { "db": "CNVD", "id": "CNVD-2020-29743", "ident": null }, { "db": "VULHUB", "id": "VHN-164641", "ident": null }, { "db": "VULMON", "id": "CVE-2020-12006", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2020-005162", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202005-306", "ident": null }, { "db": "NVD", "id": "CVE-2020-12006", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-595", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-589", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-605", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29743", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULHUB", "id": "VHN-164641", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULMON", "id": "CVE-2020-12006", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005162", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-306", "ident": null }, { "date": "2020-05-08T12:15:11.160000", "db": "NVD", "id": "CVE-2020-12006", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-595", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-589", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-605", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29743", "ident": null }, { "date": "2021-09-23T00:00:00", "db": "VULHUB", "id": "VHN-164641", "ident": null }, { "date": "2020-05-12T00:00:00", "db": "VULMON", "id": "CVE-2020-12006", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005162", "ident": null }, { "date": "2021-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-306", "ident": null }, { "date": "2024-11-21T04:59:06.080000", "db": "NVD", "id": "CVE-2020-12006", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-306" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess Node Past Traversal Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005162" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "ec7b8103-b626-4a4f-985f-bd5bdbb95287" }, { "db": "IVD", "id": "2d8fc349-4a01-4fa6-8792-ddceae01196f" }, { "db": "CNNVD", "id": "CNNVD-202005-306" } ], "trust": 1.0 } }
var-202006-1920
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability, which can be exploited by an attacker to delete arbitrary files on the server.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1920", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29402" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-29402", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-29402", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29402" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability, which can be exploited by an attacker to delete arbitrary files on the server.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29402" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29402", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29402" } ] }, "id": "VAR-202006-1920", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-29402" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29402" } ] }, "last_update_date": "2022-05-04T10:10:55.576000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA bwtalk.exe file has system command injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/215709" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29402" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29402" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-11T00:00:00", "db": "CNVD", "id": "CNVD-2020-29402" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-29402" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has arbitrary file deletion vulnerability (CNVD-2020-29402)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29402" } ], "trust": 0.6 } }
var-202011-1549
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1549", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58468" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-58468", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-58468", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58468" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58468" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58468", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58468" } ] }, "id": "VAR-202011-1549", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-58468" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58468" } ] }, "last_update_date": "2022-05-04T10:18:10.607000Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58468" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-58468" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-58468" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-58468)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58468" } ], "trust": 0.6 } }
var-201812-0480
Vulnerability from variot
WebAccess/SCADA, WebAccess/SCADA Version 8.3.2 installed on Windows 2008 R2 SP1. Lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer on the stack. WebAccess/SCADA Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment.
A buffer overflow vulnerability exists in Advantech WebAccess/SCADA version 8.3.2 based on the Windows 2008 R2 SP1 platform that could allow an attacker to execute arbitrary code or cause a denial of service in the context of an affected application. Advantech WebAccess/SCADA is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Failed exploit attempts will likely cause denial-of-service conditions. Advantech WebAccess/SCADA version 8.3.2 is vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201812-0480", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 1.7, "vendor": "advantech", "version": "8.3.2" }, { "model": "webaccess\\/scada", "scope": "eq", "trust": 1.6, "vendor": "advantech", "version": "8.3.2" }, { "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess scada", "version": "8.3.2" } ], "sources": [ { "db": "IVD", "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47" }, { "db": "CNVD", "id": "CNVD-2019-32478" }, { "db": "BID", "id": "106245" }, { "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "db": "CNNVD", "id": "CNNVD-201812-789" }, { "db": "NVD", "id": "CVE-2018-18999" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013453" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jacob Baines of Tenable Network Security", "sources": [ { "db": "BID", "id": "106245" } ], "trust": 0.3 }, "cve": "CVE-2018-18999", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-18999", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-32478", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-129614", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2018-18999", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 7.3, "baseSeverity": "High", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2018-18999", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-18999", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-18999", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2019-32478", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201812-789", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-129614", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47" }, { "db": "CNVD", "id": "CNVD-2019-32478" }, { "db": "VULHUB", "id": "VHN-129614" }, { "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "db": "CNNVD", "id": "CNNVD-201812-789" }, { "db": "NVD", "id": "CVE-2018-18999" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA, WebAccess/SCADA Version 8.3.2 installed on Windows 2008 R2 SP1. Lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer on the stack. WebAccess/SCADA Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. \n\nA buffer overflow vulnerability exists in Advantech WebAccess/SCADA version 8.3.2 based on the Windows 2008 R2 SP1 platform that could allow an attacker to execute arbitrary code or cause a denial of service in the context of an affected application. Advantech WebAccess/SCADA is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Failed exploit attempts will likely cause denial-of-service conditions. \nAdvantech WebAccess/SCADA version 8.3.2 is vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2018-18999" }, { "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "db": "CNVD", "id": "CNVD-2019-32478" }, { "db": "BID", "id": "106245" }, { "db": "IVD", "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47" }, { "db": "VULHUB", "id": "VHN-129614" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-18999", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-18-352-02", "trust": 3.4 }, { "db": "BID", "id": "106245", "trust": 2.0 }, { "db": "TENABLE", "id": "TRA-2018-45", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201812-789", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32478", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-013453", "trust": 0.8 }, { "db": "IVD", "id": "7B46AEC3-E0F9-4EAE-BEB8-00887207FB47", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-97745", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-98830", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-129614", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47" }, { "db": "CNVD", "id": "CNVD-2019-32478" }, { "db": "VULHUB", "id": "VHN-129614" }, { "db": "BID", "id": "106245" }, { "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "db": "CNNVD", "id": "CNNVD-201812-789" }, { "db": "NVD", "id": "CVE-2018-18999" } ] }, "id": "VAR-201812-0480", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47" }, { "db": "CNVD", "id": "CNVD-2019-32478" }, { "db": "VULHUB", "id": "VHN-129614" } ], "trust": 1.5586422 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47" }, { "db": "CNVD", "id": "CNVD-2019-32478" } ] }, "last_update_date": "2024-11-23T22:58:48.600000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada" }, { "title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-32478)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181475" }, { "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87986" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32478" }, { "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "db": "CNNVD", "id": "CNNVD-201812-789" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 }, { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-129614" }, { "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "db": "NVD", "id": "CVE-2018-18999" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-352-02" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/106245" }, { "trust": 1.7, "url": "https://www.tenable.com/security/research/tra-2018-45" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18999" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-18999" }, { "trust": 0.3, "url": "http://www.advantech.in/" }, { "trust": 0.3, "url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32478" }, { "db": "VULHUB", "id": "VHN-129614" }, { "db": "BID", "id": "106245" }, { "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "db": "CNNVD", "id": "CNNVD-201812-789" }, { "db": "NVD", "id": "CVE-2018-18999" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47" }, { "db": "CNVD", "id": "CNVD-2019-32478" }, { "db": "VULHUB", "id": "VHN-129614" }, { "db": "BID", "id": "106245" }, { "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "db": "CNNVD", "id": "CNNVD-201812-789" }, { "db": "NVD", "id": "CVE-2018-18999" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "7b46aec3-e0f9-4eae-beb8-00887207fb47" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32478" }, { "date": "2018-12-19T00:00:00", "db": "VULHUB", "id": "VHN-129614" }, { "date": "2018-12-18T00:00:00", "db": "BID", "id": "106245" }, { "date": "2019-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "date": "2018-12-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-789" }, { "date": "2018-12-19T18:29:00.203000", "db": "NVD", "id": "CVE-2018-18999" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-07T00:00:00", "db": "CNVD", "id": "CNVD-2019-32478" }, { "date": "2020-09-18T00:00:00", "db": "VULHUB", "id": "VHN-129614" }, { "date": "2018-12-18T00:00:00", "db": "BID", "id": "106245" }, { "date": "2019-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013453" }, { "date": "2020-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-789" }, { "date": "2024-11-21T03:57:00.923000", "db": "NVD", "id": "CVE-2018-18999" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201812-789" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebAccess/SCADA Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013453" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201812-789" } ], "trust": 0.6 } }
var-202008-1270
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain remote connection passwords, background administrator passwords and other sensitive information.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1270", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48625" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-48625", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48625", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48625" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain remote connection passwords, background administrator passwords and other sensitive information.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48625" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48625", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48625" } ] }, "id": "VAR-202008-1270", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48625" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48625" } ] }, "last_update_date": "2022-05-04T10:18:14.827000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control FileSystemObject class CopyFile member has information disclosure vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225715" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48625" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48625" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48625" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48625" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an information disclosure vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48625" } ], "trust": 0.6 } }
var-202008-1300
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-1300", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48621" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2020-48621", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-48621", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48621" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has a command execution vulnerability. Attackers can use the vulnerability to execute console commands.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48621" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48621", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48621" } ] }, "id": "VAR-202008-1300", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-48621" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48621" } ] }, "last_update_date": "2022-05-04T09:21:41.945000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA wshom control IWshShell_Class class exec member has a command execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/225721" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-48621" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-48621" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-48621" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-48621" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has command execution vulnerability (CNVD-2020-48621)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-48621" } ], "trust": 0.6 } }
var-201909-0221
Vulnerability from variot
Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated attacker to execute arbitrary code via a crafted IOCTL 70603 RPC message. Advantech WebAccess/SCADA Contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer error vulnerability exists in Advantech WebAccess/SCADA version 8.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-0221", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 1.4, "vendor": "advantech", "version": "8.4.1" }, { "model": "webaccess", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "8.4.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "8.4.1" } ], "sources": [ { "db": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad" }, { "db": "CNVD", "id": "CNVD-2019-32466" }, { "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "db": "NVD", "id": "CVE-2019-3975" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009167" } ] }, "cve": "CVE-2019-3975", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-3975", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-32466", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "6779568d-c80f-445b-ba8e-fa61163d09ad", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-155410", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-3975", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-3975", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-3975", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-3975", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-32466", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201909-431", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-155410", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad" }, { "db": "CNVD", "id": "CNVD-2019-32466" }, { "db": "VULHUB", "id": "VHN-155410" }, { "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "db": "CNNVD", "id": "CNNVD-201909-431" }, { "db": "NVD", "id": "CVE-2019-3975" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated attacker to execute arbitrary code via a crafted IOCTL 70603 RPC message. Advantech WebAccess/SCADA Contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer error vulnerability exists in Advantech WebAccess/SCADA version 8.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc", "sources": [ { "db": "NVD", "id": "CVE-2019-3975" }, { "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "db": "CNVD", "id": "CNVD-2019-32466" }, { "db": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad" }, { "db": "VULHUB", "id": "VHN-155410" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-3975", "trust": 3.3 }, { "db": "TENABLE", "id": "TRA-2019-41", "trust": 2.5 }, { "db": "CNNVD", "id": "CNNVD-201909-431", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32466", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-009167", "trust": 0.8 }, { "db": "IVD", "id": "6779568D-C80F-445B-BA8E-FA61163D09AD", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-155410", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad" }, { "db": "CNVD", "id": "CNVD-2019-32466" }, { "db": "VULHUB", "id": "VHN-155410" }, { "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "db": "CNNVD", "id": "CNNVD-201909-431" }, { "db": "NVD", "id": "CVE-2019-3975" } ] }, "id": "VAR-201909-0221", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad" }, { "db": "CNVD", "id": "CNVD-2019-32466" }, { "db": "VULHUB", "id": "VHN-155410" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad" }, { "db": "CNVD", "id": "CNVD-2019-32466" } ] }, "last_update_date": "2024-11-23T22:41:21.068000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-32466)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181499" }, { "title": "Advantech WebAccess/SCADA Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98025" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32466" }, { "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "db": "CNNVD", "id": "CNNVD-201909-431" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "CWE-120", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-155410" }, { "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "db": "NVD", "id": "CVE-2019-3975" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.tenable.com/security/research/tra-2019-41" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3975" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3975" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32466" }, { "db": "VULHUB", "id": "VHN-155410" }, { "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "db": "CNNVD", "id": "CNNVD-201909-431" }, { "db": "NVD", "id": "CVE-2019-3975" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad" }, { "db": "CNVD", "id": "CNVD-2019-32466" }, { "db": "VULHUB", "id": "VHN-155410" }, { "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "db": "CNNVD", "id": "CNNVD-201909-431" }, { "db": "NVD", "id": "CVE-2019-3975" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32466" }, { "date": "2019-09-10T00:00:00", "db": "VULHUB", "id": "VHN-155410" }, { "date": "2019-09-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "date": "2019-09-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-431" }, { "date": "2019-09-10T16:15:12.667000", "db": "NVD", "id": "CVE-2019-3975" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32466" }, { "date": "2019-09-11T00:00:00", "db": "VULHUB", "id": "VHN-155410" }, { "date": "2019-09-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009167" }, { "date": "2021-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-431" }, { "date": "2024-11-21T04:42:59.290000", "db": "NVD", "id": "CVE-2019-3975" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-431" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA Vulnerable to classic buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009167" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "6779568d-c80f-445b-ba8e-fa61163d09ad" }, { "db": "CNNVD", "id": "CNNVD-201909-431" } ], "trust": 0.8 } }
var-202108-0791
Vulnerability from variot
The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code on the WebAccess/SCADA (WebAccess/SCADA versions prior to 8.4.5, WebAccess/SCADA versions prior to 9.0.1). Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. WebAccess/SCADA The following multiple vulnerabilities exist in. * Cross-site scripting (CWE-79) - CVE-2021-22676 ‥ * Relative path traversal (CWE-23) - CVE-2021-22674 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2021-32943The expected impact depends on each vulnerability, but it may be affected as follows. * Crafted by a remote third party JavaScript When the code is sent, cookie/ Session tokens can be hijacked, redirected to malicious websites, or unintentionally manipulated in a web browser - CVE-2021-22676 ‥ * A remote third party can access the product's files and directories without authentication. - CVE-2021-22674 ‥ * Arbitrary code executed by a remote third party - CVE-2021-32943.
A buffer overflow vulnerability exists in Advantech WebAccess/SCADA that stems from the product's failure to properly validate data boundaries. An attacker can use this vulnerability to cause stack overflow. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0791", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "8.4.5" }, { "model": "webaccess\\/scada", "scope": "lt", "trust": 1.0, "vendor": "advantech", "version": "9.0.1" }, { "model": "webaccess\\/scada", "scope": "gte", "trust": 1.0, "vendor": "advantech", "version": "9.0" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "8.4.5 earlier s (v8.4 system )" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "9.0.1 earlier s (v9.0 system )" }, { "model": "webaccess/scada", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.6, "vendor": "advantech", "version": "8.4.5" }, { "model": "webaccess/scada", "scope": "lt", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59234" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "NVD", "id": "CVE-2021-32943" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "reported these vulnerabilities to CISA.,Chizuru Toyama of TXOne IoT/ICS Security Research Labs, working with Trend Micro\u2019s Zero Day Initiative", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-456" } ], "trust": 0.6 }, "cve": "CVE-2021-32943", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-32943", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2021-59234", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-392929", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-32943", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-002265", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-32943", "trust": 1.0, "value": "CRITICAL" }, { "author": "OTHER", "id": "JVNDB-2021-002265", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2021-59234", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202108-456", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-392929", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-32943", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59234" }, { "db": "VULHUB", "id": "VHN-392929" }, { "db": "VULMON", "id": "CVE-2021-32943" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-456" }, { "db": "NVD", "id": "CVE-2021-32943" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code on the WebAccess/SCADA (WebAccess/SCADA versions prior to 8.4.5, WebAccess/SCADA versions prior to 9.0.1). Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. WebAccess/SCADA The following multiple vulnerabilities exist in. * Cross-site scripting (CWE-79) - CVE-2021-22676 \u2025 * Relative path traversal (CWE-23) - CVE-2021-22674 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2021-32943The expected impact depends on each vulnerability, but it may be affected as follows. * Crafted by a remote third party JavaScript When the code is sent, cookie/ Session tokens can be hijacked, redirected to malicious websites, or unintentionally manipulated in a web browser - CVE-2021-22676 \u2025 * A remote third party can access the product\u0027s files and directories without authentication. - CVE-2021-22674 \u2025 * Arbitrary code executed by a remote third party - CVE-2021-32943. \n\r\n\r\nA buffer overflow vulnerability exists in Advantech WebAccess/SCADA that stems from the product\u0027s failure to properly validate data boundaries. An attacker can use this vulnerability to cause stack overflow. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements", "sources": [ { "db": "NVD", "id": "CVE-2021-32943" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNVD", "id": "CNVD-2021-59234" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-392929" }, { "db": "VULMON", "id": "CVE-2021-32943" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSA-21-217-04", "trust": 3.2 }, { "db": "NVD", "id": "CVE-2021-32943", "trust": 3.2 }, { "db": "JVN", "id": "JVNVU92588420", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-002265", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-59234", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2656", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021080606", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202108-456", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-392929", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-32943", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59234" }, { "db": "VULHUB", "id": "VHN-392929" }, { "db": "VULMON", "id": "CVE-2021-32943" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-456" }, { "db": "NVD", "id": "CVE-2021-32943" } ] }, "id": "VAR-202108-0791", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-59234" }, { "db": "VULHUB", "id": "VHN-392929" } ], "trust": 1.3586421999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59234" } ] }, "last_update_date": "2024-08-14T13:05:43.795000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WebAccess/SCADA", "trust": 0.8, "url": "https://www.advantech.tw/support/details/installation?id=1-MS9MJV" }, { "title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2021-59234)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/284486" }, { "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=158744" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59234" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202108-456" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Stack-based buffer overflow (CWE-121) [ Other ]", "trust": 0.8 }, { "problemtype": " Relative path traversal (CWE-23) [ Other ]", "trust": 0.8 }, { "problemtype": " Cross-site scripting (CWE-79) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-392929" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "NVD", "id": "CVE-2021-32943" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-217-04" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu92588420" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021080606" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2656" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59234" }, { "db": "VULHUB", "id": "VHN-392929" }, { "db": "VULMON", "id": "CVE-2021-32943" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-456" }, { "db": "NVD", "id": "CVE-2021-32943" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-59234" }, { "db": "VULHUB", "id": "VHN-392929" }, { "db": "VULMON", "id": "CVE-2021-32943" }, { "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202108-456" }, { "db": "NVD", "id": "CVE-2021-32943" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-08T00:00:00", "db": "CNVD", "id": "CNVD-2021-59234" }, { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-392929" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-32943" }, { "date": "2021-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-456" }, { "date": "2021-08-10T15:15:07.700000", "db": "NVD", "id": "CVE-2021-32943" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-18T00:00:00", "db": "CNVD", "id": "CNVD-2021-59234" }, { "date": "2021-08-17T00:00:00", "db": "VULHUB", "id": "VHN-392929" }, { "date": "2021-08-17T00:00:00", "db": "VULMON", "id": "CVE-2021-32943" }, { "date": "2021-08-10T06:49:00", "db": "JVNDB", "id": "JVNDB-2021-002265" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-08-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-456" }, { "date": "2021-08-17T18:42:07.610000", "db": "NVD", "id": "CVE-2021-32943" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-456" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech\u00a0 Made \u00a0WebAccess/SCADA\u00a0 Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002265" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
var-201906-1027
Vulnerability from variot
In WebAccess/SCADA Versions 8.3.5 and prior, multiple heap-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. Note: A different vulnerability than CVE-2019-10991. WebAccess/SCADA Contains a buffer error vulnerability. This vulnerability CVE-2019-10991 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x11372 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code under the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. Multiple heap-based buffer-overflow vulnerabilities 4. Multiple remote-code execution vulnerabilities An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (â??../â??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. Advantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.8, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess", "scope": null, "trust": 1.4, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.5" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.4" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3.2" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.3" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.1" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "8.0" }, { "_id": null, "model": "webaccess/scada", "scope": "eq", "trust": 0.3, "vendor": "advantech", "version": "7.2" }, { "_id": null, "model": "webaccess/scada", "scope": "ne", "trust": 0.3, "vendor": "advantech", "version": "8.4.1" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "webaccess", "version": "*" } ], "sources": [ { "db": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc" }, { "db": "ZDI", "id": "ZDI-19-591" }, { "db": "ZDI", "id": "ZDI-19-590" }, { "db": "CNVD", "id": "CNVD-2019-32464" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005814" }, { "db": "NVD", "id": "CVE-2019-10989" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005814" } ] }, "credits": { "_id": null, "data": "Mat Powell of Trend Micro Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-19-591" }, { "db": "ZDI", "id": "ZDI-19-590" } ], "trust": 1.4 }, "cve": "CVE-2019-10989", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-10989", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-32464", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-142590", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-10989", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-10989", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-10989", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2019-10989", "trust": 1.4, "value": "CRITICAL" }, { "author": "nvd@nist.gov", "id": "CVE-2019-10989", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-10989", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-32464", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-1078", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-142590", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc" }, { "db": "ZDI", "id": "ZDI-19-591" }, { "db": "ZDI", "id": "ZDI-19-590" }, { "db": "CNVD", "id": "CNVD-2019-32464" }, { "db": "VULHUB", "id": "VHN-142590" }, { "db": "JVNDB", "id": "JVNDB-2019-005814" }, { "db": "CNNVD", "id": "CNNVD-201906-1078" }, { "db": "NVD", "id": "CVE-2019-10989" } ] }, "description": { "_id": null, "data": "In WebAccess/SCADA Versions 8.3.5 and prior, multiple heap-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. Note: A different vulnerability than CVE-2019-10991. WebAccess/SCADA Contains a buffer error vulnerability. This vulnerability CVE-2019-10991 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the 0x11372 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code under the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities:\n1. A directory-traversal vulnerability\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. Multiple heap-based buffer-overflow vulnerabilities\n4. Multiple remote-code execution vulnerabilities\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (\u00e2??../\u00e2??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. \nAdvantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2019-10989" }, { "db": "JVNDB", "id": "JVNDB-2019-005814" }, { "db": "ZDI", "id": "ZDI-19-591" }, { "db": "ZDI", "id": "ZDI-19-590" }, { "db": "CNVD", "id": "CNVD-2019-32464" }, { "db": "BID", "id": "108923" }, { "db": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc" }, { "db": "VULHUB", "id": "VHN-142590" } ], "trust": 3.96 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2019-10989", "trust": 5.0 }, { "db": "ICS CERT", "id": "ICSA-19-178-05", "trust": 2.8 }, { "db": "ZDI", "id": "ZDI-19-591", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-19-590", "trust": 2.4 }, { "db": "BID", "id": "108923", "trust": 1.5 }, { "db": "CNNVD", "id": "CNNVD-201906-1078", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-32464", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-005814", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8068", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-8067", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2350", "trust": 0.6 }, { "db": "IVD", "id": "A3A80884-2713-49F5-A1E2-0B387C0701CC", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-142590", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc" }, { "db": "ZDI", "id": "ZDI-19-591" }, { "db": "ZDI", "id": "ZDI-19-590" }, { "db": "CNVD", "id": "CNVD-2019-32464" }, { "db": "VULHUB", "id": "VHN-142590" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005814" }, { "db": "CNNVD", "id": "CNNVD-201906-1078" }, { "db": "NVD", "id": "CVE-2019-10989" } ] }, "id": "VAR-201906-1027", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc" }, { "db": "CNVD", "id": "CNVD-2019-32464" }, { "db": "VULHUB", "id": "VHN-142590" } ], "trust": 1.4466745799999998 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc" }, { "db": "CNVD", "id": "CNVD-2019-32464" } ] }, "last_update_date": "2024-11-23T21:52:09.381000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "title": "Advantech WebAccess", "trust": 0.8, "url": "https://www.advantech.co.jp/industrial-automation/webaccess" }, { "title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-32464)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181497" }, { "title": "Advantech WebAccess/SCADA Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94181" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-591" }, { "db": "ZDI", "id": "ZDI-19-590" }, { "db": "CNVD", "id": "CNVD-2019-32464" }, { "db": "JVNDB", "id": "JVNDB-2019-005814" }, { "db": "CNNVD", "id": "CNNVD-201906-1078" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142590" }, { "db": "JVNDB", "id": "JVNDB-2019-005814" }, { "db": "NVD", "id": "CVE-2019-10989" } ] }, "references": { "_id": null, "data": [ { "trust": 4.2, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-591/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-590/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10989" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/108923" }, { "trust": 0.9, "url": "http://webaccess.advantech.com" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10989" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2350/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-591" }, { "db": "ZDI", "id": "ZDI-19-590" }, { "db": "CNVD", "id": "CNVD-2019-32464" }, { "db": "VULHUB", "id": "VHN-142590" }, { "db": "BID", "id": "108923" }, { "db": "JVNDB", "id": "JVNDB-2019-005814" }, { "db": "CNNVD", "id": "CNNVD-201906-1078" }, { "db": "NVD", "id": "CVE-2019-10989" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc", "ident": null }, { "db": "ZDI", "id": "ZDI-19-591", "ident": null }, { "db": "ZDI", "id": "ZDI-19-590", "ident": null }, { "db": "CNVD", "id": "CNVD-2019-32464", "ident": null }, { "db": "VULHUB", "id": "VHN-142590", "ident": null }, { "db": "BID", "id": "108923", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2019-005814", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201906-1078", "ident": null }, { "db": "NVD", "id": "CVE-2019-10989", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-591", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-590", "ident": null }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32464", "ident": null }, { "date": "2019-06-28T00:00:00", "db": "VULHUB", "id": "VHN-142590", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005814", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1078", "ident": null }, { "date": "2019-06-28T21:15:11.243000", "db": "NVD", "id": "CVE-2019-10989", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-591", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "ZDI", "id": "ZDI-19-590", "ident": null }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32464", "ident": null }, { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-142590", "ident": null }, { "date": "2019-06-27T00:00:00", "db": "BID", "id": "108923", "ident": null }, { "date": "2019-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005814", "ident": null }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-1078", "ident": null }, { "date": "2024-11-21T04:20:18.283000", "db": "NVD", "id": "CVE-2019-10989", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-1078" } ], "trust": 0.6 }, "title": { "_id": null, "data": "WebAccess/SCADA Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005814" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "a3a80884-2713-49f5-a1e2-0b387c0701cc" }, { "db": "CNNVD", "id": "CNNVD-201906-1078" } ], "trust": 0.8 } }
var-202010-1639
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1639", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57242" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-57242", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-57242", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57242" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-57242" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-57242", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57242" } ] }, "id": "VAR-202010-1639", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-57242" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-57242" } ] }, "last_update_date": "2022-05-04T10:14:58.953000Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-57242" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-19T00:00:00", "db": "CNVD", "id": "CNVD-2020-57242" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-19T00:00:00", "db": "CNVD", "id": "CNVD-2020-57242" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has a denial of service vulnerability (CNVD-2020-57242)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-57242" } ], "trust": 0.6 } }
var-202005-0312
Vulnerability from variot
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000277d in ViewSrv.dll. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202005-0312", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess", "scope": "eq", "trust": 1.8, "vendor": "advantech", "version": "9.0.0" }, { "model": "webaccess/scada", "scope": null, "trust": 1.4, "vendor": "advantech", "version": null }, { "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.4.4" }, { "model": "webaccess", "scope": "eq", "trust": 0.8, "vendor": "advantech", "version": "8.4.4" }, { "model": "webaccess node", "scope": "gte", "trust": 0.6, "vendor": "advantech", "version": "8.4.4" }, { "model": "webaccess node", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "9.0.0" } ], "sources": [ { "db": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062" }, { "db": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d" }, { "db": "ZDI", "id": "ZDI-20-626" }, { "db": "ZDI", "id": "ZDI-20-627" }, { "db": "CNVD", "id": "CNVD-2020-29742" }, { "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "db": "NVD", "id": "CVE-2020-12026" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005147" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-626" }, { "db": "ZDI", "id": "ZDI-20-627" } ], "trust": 1.4 }, "cve": "CVE-2020-12026", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2020-12026", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005147", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CNVD-2020-29742", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "f4254815-d8f8-4350-9a94-696eea61a062", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-164663", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12026", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-12026", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005147", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2020-12026", "trust": 1.4, "value": "CRITICAL" }, { "author": "nvd@nist.gov", "id": "CVE-2020-12026", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-005147", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-29742", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202005-303", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-164663", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-12026", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062" }, { "db": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d" }, { "db": "ZDI", "id": "ZDI-20-626" }, { "db": "ZDI", "id": "ZDI-20-627" }, { "db": "CNVD", "id": "CNVD-2020-29742" }, { "db": "VULHUB", "id": "VHN-164663" }, { "db": "VULMON", "id": "CVE-2020-12026" }, { "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "db": "CNNVD", "id": "CNNVD-202005-303" }, { "db": "NVD", "id": "CVE-2020-12026" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application\u2019s control. Advantech WebAccess Node Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000277d in ViewSrv.dll. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required", "sources": [ { "db": "NVD", "id": "CVE-2020-12026" }, { "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "db": "ZDI", "id": "ZDI-20-626" }, { "db": "ZDI", "id": "ZDI-20-627" }, { "db": "CNVD", "id": "CNVD-2020-29742" }, { "db": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062" }, { "db": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d" }, { "db": "VULHUB", "id": "VHN-164663" }, { "db": "VULMON", "id": "CVE-2020-12026" } ], "trust": 3.96 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12026", "trust": 5.0 }, { "db": "ICS CERT", "id": "ICSA-20-128-01", "trust": 3.2 }, { "db": "ZDI", "id": "ZDI-20-626", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-627", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2020-29742", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-202005-303", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU93292753", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005147", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9907", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9899", "trust": 0.7 }, { "db": "NSFOCUS", "id": "47694", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1646", "trust": 0.6 }, { "db": "IVD", "id": "F4254815-D8F8-4350-9A94-696EEA61A062", "trust": 0.2 }, { "db": "IVD", "id": "7B562860-41D1-412D-8D4E-7ED58E4B7F7D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-164663", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-12026", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062" }, { "db": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d" }, { "db": "ZDI", "id": "ZDI-20-626" }, { "db": "ZDI", "id": "ZDI-20-627" }, { "db": "CNVD", "id": "CNVD-2020-29742" }, { "db": "VULHUB", "id": "VHN-164663" }, { "db": "VULMON", "id": "CVE-2020-12026" }, { "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "db": "CNNVD", "id": "CNNVD-202005-303" }, { "db": "NVD", "id": "CVE-2020-12026" } ] }, "id": "VAR-202005-0312", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062" }, { "db": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d" }, { "db": "CNVD", "id": "CNVD-2020-29742" }, { "db": "VULHUB", "id": "VHN-164663" } ], "trust": 1.679503486666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062" }, { "db": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d" }, { "db": "CNVD", "id": "CNVD-2020-29742" } ] }, "last_update_date": "2024-11-23T21:59:18.592000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.advantech.com/" }, { "title": "Patch for Advantech WebAccess Node Path Traversal Vulnerability (CNVD-2020-29742)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/218851" }, { "title": "Advantech WebAccess Node Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=118654" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-626" }, { "db": "ZDI", "id": "ZDI-20-627" }, { "db": "CNVD", "id": "CNVD-2020-29742" }, { "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "db": "CNNVD", "id": "CNNVD-202005-303" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.9 }, { "problemtype": "CWE-23", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-164663" }, { "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "db": "NVD", "id": "CVE-2020-12026" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-626/" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12026" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12026" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93292753/" }, { "trust": 0.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-627/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1646/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47694" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/22.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-626" }, { "db": "ZDI", "id": "ZDI-20-627" }, { "db": "CNVD", "id": "CNVD-2020-29742" }, { "db": "VULHUB", "id": "VHN-164663" }, { "db": "VULMON", "id": "CVE-2020-12026" }, { "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "db": "CNNVD", "id": "CNNVD-202005-303" }, { "db": "NVD", "id": "CVE-2020-12026" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062" }, { "db": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d" }, { "db": "ZDI", "id": "ZDI-20-626" }, { "db": "ZDI", "id": "ZDI-20-627" }, { "db": "CNVD", "id": "CNVD-2020-29742" }, { "db": "VULHUB", "id": "VHN-164663" }, { "db": "VULMON", "id": "CVE-2020-12026" }, { "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "db": "CNNVD", "id": "CNNVD-202005-303" }, { "db": "NVD", "id": "CVE-2020-12026" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062" }, { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d" }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-626" }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-627" }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29742" }, { "date": "2020-05-08T00:00:00", "db": "VULHUB", "id": "VHN-164663" }, { "date": "2020-05-08T00:00:00", "db": "VULMON", "id": "CVE-2020-12026" }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "date": "2020-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-303" }, { "date": "2020-05-08T12:15:11.443000", "db": "NVD", "id": "CVE-2020-12026" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-626" }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-627" }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29742" }, { "date": "2021-09-23T00:00:00", "db": "VULHUB", "id": "VHN-164663" }, { "date": "2020-05-11T00:00:00", "db": "VULMON", "id": "CVE-2020-12026" }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005147" }, { "date": "2021-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-303" }, { "date": "2024-11-21T04:59:08.347000", "db": "NVD", "id": "CVE-2020-12026" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-303" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess Node Past Traversal Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005147" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "f4254815-d8f8-4350-9a94-696eea61a062" }, { "db": "IVD", "id": "7b562860-41d1-412d-8d4e-7ed58e4b7f7d" }, { "db": "CNNVD", "id": "CNNVD-202005-303" } ], "trust": 1.0 } }
var-202006-1911
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability, which can be exploited by an attacker to delete arbitrary files on the server.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1911", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29406" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-29406", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-29406", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29406" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability, which can be exploited by an attacker to delete arbitrary files on the server.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29406" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29406", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29406" } ] }, "id": "VAR-202006-1911", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-29406" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29406" } ] }, "last_update_date": "2022-05-04T09:21:49.544000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA BwDlgpUp file has arbitrary file deletion vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/216129" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29406" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29406" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-11T00:00:00", "db": "CNVD", "id": "CNVD-2020-29406" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-29406" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has arbitrary file deletion vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29406" } ], "trust": 0.6 } }
var-202011-1538
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.
Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1538", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58462" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-58462", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-58462", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58462" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture.\n\r\n\r\nAdvantech WebAccess/SCADA has an arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58462" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58462", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58462" } ] }, "id": "VAR-202011-1538", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-58462" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-58462" } ] }, "last_update_date": "2022-05-04T09:59:39.996000Z", "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-58462" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-58462" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-58462" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has an arbitrary file deletion vulnerability (CNVD-2020-58462)", "sources": [ { "db": "CNVD", "id": "CNVD-2020-58462" } ], "trust": 0.6 } }
var-202005-1250
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x520B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-610" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-610" } ], "trust": 0.7 }, "cvss": { "_id": null, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "ZDI-20-610", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-610", "trust": 0.7, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-610" } ] }, "description": { "_id": null, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x520B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.", "sources": [ { "db": "ZDI", "id": "ZDI-20-610" } ], "trust": 0.7 }, "external_ids": { "_id": null, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-9941", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-610", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-610" } ] }, "id": "VAR-202005-1250", "iot": { "_id": null, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6405517 }, "last_update_date": "2022-05-17T01:50:52.307000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-610" } ] }, "references": { "_id": null, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-610" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-20-610", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-610", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-610", "ident": null } ] }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA DATACORE IOCTL 0x520B Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-610" } ], "trust": 0.7 } }
var-202005-0008
Vulnerability from variot
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791d in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 9.1, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 1.0, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": "webaccess node", "scope": "gte", "trust": 0.6, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "9.0.0" } ], "sources": [ { "db": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754" }, { "db": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec" }, { "db": "ZDI", "id": "ZDI-20-593" }, { "db": "ZDI", "id": "ZDI-20-597" }, { "db": "ZDI", "id": "ZDI-20-599" }, { "db": "ZDI", "id": "ZDI-20-631" }, { "db": "ZDI", "id": "ZDI-20-603" }, { "db": "ZDI", "id": "ZDI-20-604" }, { "db": "ZDI", "id": "ZDI-20-601" }, { "db": "ZDI", "id": "ZDI-20-600" }, { "db": "ZDI", "id": "ZDI-20-621" }, { "db": "ZDI", "id": "ZDI-20-618" }, { "db": "ZDI", "id": "ZDI-20-602" }, { "db": "ZDI", "id": "ZDI-20-623" }, { "db": "ZDI", "id": "ZDI-20-616" }, { "db": "CNVD", "id": "CNVD-2020-29739" }, { "db": "NVD", "id": "CVE-2020-10638" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-593" }, { "db": "ZDI", "id": "ZDI-20-597" }, { "db": "ZDI", "id": "ZDI-20-599" }, { "db": "ZDI", "id": "ZDI-20-631" }, { "db": "ZDI", "id": "ZDI-20-603" }, { "db": "ZDI", "id": "ZDI-20-604" }, { "db": "ZDI", "id": "ZDI-20-601" }, { "db": "ZDI", "id": "ZDI-20-600" }, { "db": "ZDI", "id": "ZDI-20-621" }, { "db": "ZDI", "id": "ZDI-20-618" }, { "db": "ZDI", "id": "ZDI-20-602" }, { "db": "ZDI", "id": "ZDI-20-623" }, { "db": "ZDI", "id": "ZDI-20-616" } ], "trust": 9.1 }, "cve": "CVE-2020-10638", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-10638", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-29739", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-10638", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 9.1, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-10638", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "ZDI", "id": "CVE-2020-10638", "trust": 9.1, "value": "CRITICAL" }, { "author": "nvd@nist.gov", "id": "CVE-2020-10638", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2020-29739", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202005-295", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec", "trust": 0.2, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-10638", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754" }, { "db": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec" }, { "db": "ZDI", "id": "ZDI-20-593" }, { "db": "ZDI", "id": "ZDI-20-597" }, { "db": "ZDI", "id": "ZDI-20-599" }, { "db": "ZDI", "id": "ZDI-20-631" }, { "db": "ZDI", "id": "ZDI-20-603" }, { "db": "ZDI", "id": "ZDI-20-604" }, { "db": "ZDI", "id": "ZDI-20-601" }, { "db": "ZDI", "id": "ZDI-20-600" }, { "db": "ZDI", "id": "ZDI-20-621" }, { "db": "ZDI", "id": "ZDI-20-618" }, { "db": "ZDI", "id": "ZDI-20-602" }, { "db": "ZDI", "id": "ZDI-20-623" }, { "db": "ZDI", "id": "ZDI-20-616" }, { "db": "CNVD", "id": "CNVD-2020-29739" }, { "db": "VULMON", "id": "CVE-2020-10638" }, { "db": "CNNVD", "id": "CNNVD-202005-295" }, { "db": "NVD", "id": "CVE-2020-10638" } ] }, "description": { "_id": null, "data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x0000791d in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required", "sources": [ { "db": "NVD", "id": "CVE-2020-10638" }, { "db": "ZDI", "id": "ZDI-20-601" }, { "db": "ZDI", "id": "ZDI-20-616" }, { "db": "ZDI", "id": "ZDI-20-623" }, { "db": "ZDI", "id": "ZDI-20-602" }, { "db": "ZDI", "id": "ZDI-20-618" }, { "db": "ZDI", "id": "ZDI-20-621" }, { "db": "ZDI", "id": "ZDI-20-600" }, { "db": "ZDI", "id": "ZDI-20-604" }, { "db": "ZDI", "id": "ZDI-20-603" }, { "db": "ZDI", "id": "ZDI-20-631" }, { "db": "ZDI", "id": "ZDI-20-599" }, { "db": "ZDI", "id": "ZDI-20-597" }, { "db": "ZDI", "id": "ZDI-20-593" }, { "db": "CNVD", "id": "CNVD-2020-29739" }, { "db": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec" }, { "db": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754" }, { "db": "VULMON", "id": "CVE-2020-10638" } ], "trust": 10.08 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-10638", "trust": 11.8 }, { "db": "ZDI", "id": "ZDI-20-593", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-20-599", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-20-603", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-20-600", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-20-621", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-20-616", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-20-128-01", "trust": 2.3 }, { "db": "CNVD", "id": "CNVD-2020-29739", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-202005-295", "trust": 1.0 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9902", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9985", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-597", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9994", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9892", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-631", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9897", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9898", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-604", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9998", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-601", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9997", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10085", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9891", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-618", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9895", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-602", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10337", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-623", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9889", "trust": 0.7 }, { "db": "NSFOCUS", "id": "47382", "trust": 0.6 }, { "db": "ZDI", "id": "ZDI-20-635", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1646", "trust": 0.6 }, { "db": "IVD", "id": "95F15ED9-ABD1-4FA7-B3B8-CCE038C93754", "trust": 0.2 }, { "db": "IVD", "id": "619B16C7-A995-4CDF-B7BE-D91E2BDC75EC", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2020-10638", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754" }, { "db": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec" }, { "db": "ZDI", "id": "ZDI-20-593" }, { "db": "ZDI", "id": "ZDI-20-597" }, { "db": "ZDI", "id": "ZDI-20-599" }, { "db": "ZDI", "id": "ZDI-20-631" }, { "db": "ZDI", "id": "ZDI-20-603" }, { "db": "ZDI", "id": "ZDI-20-604" }, { "db": "ZDI", "id": "ZDI-20-601" }, { "db": "ZDI", "id": "ZDI-20-600" }, { "db": "ZDI", "id": "ZDI-20-621" }, { "db": "ZDI", "id": "ZDI-20-618" }, { "db": "ZDI", "id": "ZDI-20-602" }, { "db": "ZDI", "id": "ZDI-20-623" }, { "db": "ZDI", "id": "ZDI-20-616" }, { "db": "CNVD", "id": "CNVD-2020-29739" }, { "db": "VULMON", "id": "CVE-2020-10638" }, { "db": "CNNVD", "id": "CNNVD-202005-295" }, { "db": "NVD", "id": "CVE-2020-10638" } ] }, "id": "VAR-202005-0008", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754" }, { "db": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec" }, { "db": "CNVD", "id": "CNVD-2020-29739" } ], "trust": 1.5795034866666668 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754" }, { "db": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec" }, { "db": "CNVD", "id": "CNVD-2020-29739" } ] }, "last_update_date": "2024-11-29T22:41:10.312000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 9.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "title": "Patch for Advantech WebAccess Node buffer overflow vulnerability (CNVD-2020-29739)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/218845" }, { "title": "Advantech WebAccess Node Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=118647" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-593" }, { "db": "ZDI", "id": "ZDI-20-597" }, { "db": "ZDI", "id": "ZDI-20-599" }, { "db": "ZDI", "id": "ZDI-20-631" }, { "db": "ZDI", "id": "ZDI-20-603" }, { "db": "ZDI", "id": "ZDI-20-604" }, { "db": "ZDI", "id": "ZDI-20-601" }, { "db": "ZDI", "id": "ZDI-20-600" }, { "db": "ZDI", "id": "ZDI-20-621" }, { "db": "ZDI", "id": "ZDI-20-618" }, { "db": "ZDI", "id": "ZDI-20-602" }, { "db": "ZDI", "id": "ZDI-20-623" }, { "db": "ZDI", "id": "ZDI-20-616" }, { "db": "CNVD", "id": "CNVD-2020-29739" }, { "db": "CNNVD", "id": "CNNVD-202005-295" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-122", "trust": 1.0 }, { "problemtype": "CWE-787", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-10638" } ] }, "references": { "_id": null, "data": [ { "trust": 9.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "trust": 2.9, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-593/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-599/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-600/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-603/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-616/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-621/" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-635/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10638" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47382" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1646/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181596" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-593" }, { "db": "ZDI", "id": "ZDI-20-597" }, { "db": "ZDI", "id": "ZDI-20-599" }, { "db": "ZDI", "id": "ZDI-20-631" }, { "db": "ZDI", "id": "ZDI-20-603" }, { "db": "ZDI", "id": "ZDI-20-604" }, { "db": "ZDI", "id": "ZDI-20-601" }, { "db": "ZDI", "id": "ZDI-20-600" }, { "db": "ZDI", "id": "ZDI-20-621" }, { "db": "ZDI", "id": "ZDI-20-618" }, { "db": "ZDI", "id": "ZDI-20-602" }, { "db": "ZDI", "id": "ZDI-20-623" }, { "db": "ZDI", "id": "ZDI-20-616" }, { "db": "CNVD", "id": "CNVD-2020-29739" }, { "db": "VULMON", "id": "CVE-2020-10638" }, { "db": "CNNVD", "id": "CNNVD-202005-295" }, { "db": "NVD", "id": "CVE-2020-10638" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754", "ident": null }, { "db": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec", "ident": null }, { "db": "ZDI", "id": "ZDI-20-593", "ident": null }, { "db": "ZDI", "id": "ZDI-20-597", "ident": null }, { "db": "ZDI", "id": "ZDI-20-599", "ident": null }, { "db": "ZDI", "id": "ZDI-20-631", "ident": null }, { "db": "ZDI", "id": "ZDI-20-603", "ident": null }, { "db": "ZDI", "id": "ZDI-20-604", "ident": null }, { "db": "ZDI", "id": "ZDI-20-601", "ident": null }, { "db": "ZDI", "id": "ZDI-20-600", "ident": null }, { "db": "ZDI", "id": "ZDI-20-621", "ident": null }, { "db": "ZDI", "id": "ZDI-20-618", "ident": null }, { "db": "ZDI", "id": "ZDI-20-602", "ident": null }, { "db": "ZDI", "id": "ZDI-20-623", "ident": null }, { "db": "ZDI", "id": "ZDI-20-616", "ident": null }, { "db": "CNVD", "id": "CNVD-2020-29739", "ident": null }, { "db": "VULMON", "id": "CVE-2020-10638", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202005-295", "ident": null }, { "db": "NVD", "id": "CVE-2020-10638", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-593", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-597", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-599", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-631", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-603", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-604", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-601", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-600", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-621", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-618", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-602", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-623", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-616", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29739", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULMON", "id": "CVE-2020-10638", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-295", "ident": null }, { "date": "2020-05-08T12:15:11.067000", "db": "NVD", "id": "CVE-2020-10638", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-593", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-597", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-599", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-631", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-603", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-604", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-601", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-600", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-621", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-618", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-602", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-623", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-616", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29739", "ident": null }, { "date": "2020-05-12T00:00:00", "db": "VULMON", "id": "CVE-2020-10638", "ident": null }, { "date": "2021-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-295", "ident": null }, { "date": "2024-11-21T04:55:45.027000", "db": "NVD", "id": "CVE-2020-10638", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-295" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA ViewSrv IOCTL 0x00002723 Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-593" } ], "trust": 0.7 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754" }, { "db": "IVD", "id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec" }, { "db": "CNNVD", "id": "CNNVD-202005-295" } ], "trust": 1.0 } }
var-202306-0130
Vulnerability from variot
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202306-0130", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "9.1.3" }, { "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=9.1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15541" }, { "db": "NVD", "id": "CVE-2023-32628" } ] }, "cve": "CVE-2023-32628", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2024-15541", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2023-32628", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ics-cert@hq.dhs.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2023-32628", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-32628", "trust": 1.0, "value": "CRITICAL" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2023-32628", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2024-15541", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202306-087", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15541" }, { "db": "CNNVD", "id": "CNNVD-202306-087" }, { "db": "NVD", "id": "CVE-2023-32628" }, { "db": "NVD", "id": "CVE-2023-32628" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\n\n\n\n\nIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2023-32628" }, { "db": "CNVD", "id": "CNVD-2024-15541" }, { "db": "VULMON", "id": "CVE-2023-32628" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-32628", "trust": 2.3 }, { "db": "ICS CERT", "id": "ICSA-23-152-01", "trust": 1.7 }, { "db": "AUSCERT", "id": "ESB-2023.3138", "trust": 1.2 }, { "db": "CNVD", "id": "CNVD-2024-15541", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202306-087", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2023-32628", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15541" }, { "db": "VULMON", "id": "CVE-2023-32628" }, { "db": "CNNVD", "id": "CNNVD-202306-087" }, { "db": "NVD", "id": "CVE-2023-32628" } ] }, "id": "VAR-202306-0130", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-15541" } ], "trust": 1.2586422 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15541" } ] }, "last_update_date": "2024-08-14T14:43:12.454000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Advantech WebAccess/SCADA arbitrary file upload vulnerability (CNVD-2024-15541)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/537536" }, { "title": "Advantech WebAccess/SCADA Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=241309" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15541" }, { "db": "CNNVD", "id": "CNNVD-202306-087" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-434", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2023-32628" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01" }, { "trust": 1.2, "url": "https://www.auscert.org.au/bulletins/esb-2023.3138" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2023-32628/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-32628" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/434.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15541" }, { "db": "VULMON", "id": "CVE-2023-32628" }, { "db": "CNNVD", "id": "CNNVD-202306-087" }, { "db": "NVD", "id": "CVE-2023-32628" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-15541" }, { "db": "VULMON", "id": "CVE-2023-32628" }, { "db": "CNNVD", "id": "CNNVD-202306-087" }, { "db": "NVD", "id": "CVE-2023-32628" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2024-15541" }, { "date": "2023-06-06T00:00:00", "db": "VULMON", "id": "CVE-2023-32628" }, { "date": "2023-06-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-087" }, { "date": "2023-06-06T00:15:10.177000", "db": "NVD", "id": "CVE-2023-32628" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2024-15541" }, { "date": "2023-06-06T00:00:00", "db": "VULMON", "id": "CVE-2023-32628" }, { "date": "2023-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-087" }, { "date": "2023-06-12T16:53:19.953000", "db": "NVD", "id": "CVE-2023-32628" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-087" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA arbitrary file upload vulnerability (CNVD-2024-15541)", "sources": [ { "db": "CNVD", "id": "CNVD-2024-15541" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-087" } ], "trust": 0.6 } }
var-202005-0337
Vulnerability from variot
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized and may allow an attacker to inject SQL commands. Advantech WebAccess Node To SQL An injection vulnerability exists.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00013c71 in BwWebSvc.dll. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is caused by the program not properly sanitizing user input
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 2.1, "vendor": "advantech", "version": null }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 1.9, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": "webaccess", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess", "scope": "eq", "trust": 0.9, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "gte", "trust": 0.6, "vendor": "advantech", "version": "8.4.4" }, { "_id": null, "model": "webaccess node", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "webaccess", "version": "9.0.0" } ], "sources": [ { "db": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e" }, { "db": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c" }, { "db": "ZDI", "id": "ZDI-20-615" }, { "db": "ZDI", "id": "ZDI-20-613" }, { "db": "ZDI", "id": "ZDI-20-614" }, { "db": "CNVD", "id": "CNVD-2020-29741" }, { "db": "VULMON", "id": "CVE-2020-12014" }, { "db": "JVNDB", "id": "JVNDB-2020-005144" }, { "db": "NVD", "id": "CVE-2020-12014" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005144" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-615" }, { "db": "ZDI", "id": "ZDI-20-613" }, { "db": "ZDI", "id": "ZDI-20-614" } ], "trust": 2.1 }, "cve": "CVE-2020-12014", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-12014", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005144", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-29741", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "dc75839d-760d-4e08-87b4-f1096616019c", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-164650", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12014", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.1, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12014", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005144", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2020-12014", "trust": 2.1, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2020-12014", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-005144", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-29741", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202005-299", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-164650", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-12014", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e" }, { "db": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c" }, { "db": "ZDI", "id": "ZDI-20-615" }, { "db": "ZDI", "id": "ZDI-20-613" }, { "db": "ZDI", "id": "ZDI-20-614" }, { "db": "CNVD", "id": "CNVD-2020-29741" }, { "db": "VULHUB", "id": "VHN-164650" }, { "db": "VULMON", "id": "CVE-2020-12014" }, { "db": "JVNDB", "id": "JVNDB-2020-005144" }, { "db": "CNNVD", "id": "CNNVD-202005-299" }, { "db": "NVD", "id": "CVE-2020-12014" } ] }, "description": { "_id": null, "data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized and may allow an attacker to inject SQL commands. Advantech WebAccess Node To SQL An injection vulnerability exists.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00013c71 in BwWebSvc.dll. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is caused by the program not properly sanitizing user input", "sources": [ { "db": "NVD", "id": "CVE-2020-12014" }, { "db": "JVNDB", "id": "JVNDB-2020-005144" }, { "db": "ZDI", "id": "ZDI-20-615" }, { "db": "ZDI", "id": "ZDI-20-613" }, { "db": "ZDI", "id": "ZDI-20-614" }, { "db": "CNVD", "id": "CNVD-2020-29741" }, { "db": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e" }, { "db": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c" }, { "db": "VULHUB", "id": "VHN-164650" }, { "db": "VULMON", "id": "CVE-2020-12014" } ], "trust": 4.59 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-12014", "trust": 5.7 }, { "db": "ICS CERT", "id": "ICSA-20-128-01", "trust": 3.2 }, { "db": "ZDI", "id": "ZDI-20-613", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-20-615", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2020-29741", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-202005-299", "trust": 1.1 }, { "db": "ZDI", "id": "ZDI-20-614", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU93292753", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005144", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9884", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9882", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-9883", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1646", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47352", "trust": 0.6 }, { "db": "IVD", "id": "C69F120F-13C6-4366-BC67-15C6B3FA728E", "trust": 0.2 }, { "db": "IVD", "id": "DC75839D-760D-4E08-87B4-F1096616019C", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-164650", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-12014", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e" }, { "db": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c" }, { "db": "ZDI", "id": "ZDI-20-615" }, { "db": "ZDI", "id": "ZDI-20-613" }, { "db": "ZDI", "id": "ZDI-20-614" }, { "db": "CNVD", "id": "CNVD-2020-29741" }, { "db": "VULHUB", "id": "VHN-164650" }, { "db": "VULMON", "id": "CVE-2020-12014" }, { "db": "JVNDB", "id": "JVNDB-2020-005144" }, { "db": "CNNVD", "id": "CNNVD-202005-299" }, { "db": "NVD", "id": "CVE-2020-12014" } ] }, "id": "VAR-202005-0337", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e" }, { "db": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c" }, { "db": "CNVD", "id": "CNVD-2020-29741" }, { "db": "VULHUB", "id": "VHN-164650" } ], "trust": 1.679503486666667 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e" }, { "db": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c" }, { "db": "CNVD", "id": "CNVD-2020-29741" } ] }, "last_update_date": "2024-11-23T21:59:18.257000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 2.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.advantech.com/" }, { "title": "Patch for Advantech WebAccess Node SQL injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/218849" }, { "title": "Advantech WebAccess Node SQL Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=118218" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-615" }, { "db": "ZDI", "id": "ZDI-20-613" }, { "db": "ZDI", "id": "ZDI-20-614" }, { "db": "CNVD", "id": "CNVD-2020-29741" }, { "db": "JVNDB", "id": "JVNDB-2020-005144" }, { "db": "CNNVD", "id": "CNNVD-202005-299" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-89", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-164650" }, { "db": "JVNDB", "id": "JVNDB-2020-005144" }, { "db": "NVD", "id": "CVE-2020-12014" } ] }, "references": { "_id": null, "data": [ { "trust": 3.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01" }, { "trust": 2.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" }, { "trust": 1.8, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-613/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12014" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12014" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93292753/" }, { "trust": 0.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-615/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1646/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47352" }, { "trust": 0.1, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-614/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/89.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181600" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-615" }, { "db": "ZDI", "id": "ZDI-20-613" }, { "db": "ZDI", "id": "ZDI-20-614" }, { "db": "CNVD", "id": "CNVD-2020-29741" }, { "db": "VULHUB", "id": "VHN-164650" }, { "db": "VULMON", "id": "CVE-2020-12014" }, { "db": "JVNDB", "id": "JVNDB-2020-005144" }, { "db": "CNNVD", "id": "CNNVD-202005-299" }, { "db": "NVD", "id": "CVE-2020-12014" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e", "ident": null }, { "db": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c", "ident": null }, { "db": "ZDI", "id": "ZDI-20-615", "ident": null }, { "db": "ZDI", "id": "ZDI-20-613", "ident": null }, { "db": "ZDI", "id": "ZDI-20-614", "ident": null }, { "db": "CNVD", "id": "CNVD-2020-29741", "ident": null }, { "db": "VULHUB", "id": "VHN-164650", "ident": null }, { "db": "VULMON", "id": "CVE-2020-12014", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2020-005144", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202005-299", "ident": null }, { "db": "NVD", "id": "CVE-2020-12014", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-615", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-613", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-614", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29741", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULHUB", "id": "VHN-164650", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "VULMON", "id": "CVE-2020-12014", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005144", "ident": null }, { "date": "2020-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-299", "ident": null }, { "date": "2020-05-08T12:15:11.253000", "db": "NVD", "id": "CVE-2020-12014", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-615", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-613", "ident": null }, { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-614", "ident": null }, { "date": "2020-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-29741", "ident": null }, { "date": "2020-05-11T00:00:00", "db": "VULHUB", "id": "VHN-164650", "ident": null }, { "date": "2020-05-11T00:00:00", "db": "VULMON", "id": "CVE-2020-12014", "ident": null }, { "date": "2020-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005144", "ident": null }, { "date": "2020-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-299", "ident": null }, { "date": "2024-11-21T04:59:07.050000", "db": "NVD", "id": "CVE-2020-12014", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-299" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Advantech WebAccess Node SQL injection vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29741" }, { "db": "CNNVD", "id": "CNNVD-202005-299" } ], "trust": 1.2 }, "type": { "_id": null, "data": "SQL injection", "sources": [ { "db": "IVD", "id": "c69f120f-13c6-4366-bc67-15c6b3fa728e" }, { "db": "IVD", "id": "dc75839d-760d-4e08-87b4-f1096616019c" }, { "db": "CNNVD", "id": "CNNVD-202005-299" } ], "trust": 1.0 } }
var-202006-1889
Vulnerability from variot
Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).
There is a denial of service vulnerability in Advantech WebAccess/SCADA, which can be exploited by an attacker to cause the program to crash.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1889", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess/scada", "scope": "eq", "trust": 0.6, "vendor": "advantech", "version": "9.0.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29404" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-29404", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-29404", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29404" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chinese company Advantech (Advantech).\n\r\n\r\nThere is a denial of service vulnerability in Advantech WebAccess/SCADA, which can be exploited by an attacker to cause the program to crash.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29404" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29404", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29404" } ] }, "id": "VAR-202006-1889", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-29404" } ], "trust": 1.2405517 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29404" } ] }, "last_update_date": "2022-05-04T09:38:08.294000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess SCADA bwmciw file has system command injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/216133" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29404" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29404" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-11T00:00:00", "db": "CNVD", "id": "CNVD-2020-29404" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-29404" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA has a denial of service vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-29404" } ], "trust": 0.6 } }
var-202306-0132
Vulnerability from variot
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202306-0132", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess\\/scada", "scope": "lte", "trust": 1.0, "vendor": "advantech", "version": "9.1.3" }, { "model": "webaccess/scada", "scope": "lte", "trust": 0.6, "vendor": "advantech", "version": "\u003c=9.1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15542" }, { "db": "NVD", "id": "CVE-2023-32540" } ] }, "cve": "CVE-2023-32540", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2024-15542", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2023-32540", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ics-cert@hq.dhs.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2023-32540", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-32540", "trust": 1.0, "value": "CRITICAL" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2023-32540", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2024-15542", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202306-088", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15542" }, { "db": "CNNVD", "id": "CNNVD-202306-088" }, { "db": "NVD", "id": "CVE-2023-32540" }, { "db": "NVD", "id": "CVE-2023-32540" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\nIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture from China Advantech Company. The software supports dynamic graphic display and real-time data control, and provides remote control and management of automation equipment", "sources": [ { "db": "NVD", "id": "CVE-2023-32540" }, { "db": "CNVD", "id": "CNVD-2024-15542" }, { "db": "VULMON", "id": "CVE-2023-32540" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-32540", "trust": 2.3 }, { "db": "ICS CERT", "id": "ICSA-23-152-01", "trust": 1.7 }, { "db": "AUSCERT", "id": "ESB-2023.3138", "trust": 1.2 }, { "db": "CNVD", "id": "CNVD-2024-15542", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202306-088", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2023-32540", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15542" }, { "db": "VULMON", "id": "CVE-2023-32540" }, { "db": "CNNVD", "id": "CNNVD-202306-088" }, { "db": "NVD", "id": "CVE-2023-32540" } ] }, "id": "VAR-202306-0132", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-15542" } ], "trust": 1.2586422 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15542" } ] }, "last_update_date": "2024-08-14T14:43:12.403000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Advantech WebAccess/SCADA Arbitrary File Overwrite Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/537531" }, { "title": "Advantech WebAccess/SCADA Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=241310" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15542" }, { "db": "CNNVD", "id": "CNNVD-202306-088" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2023-32540" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01" }, { "trust": 1.2, "url": "https://www.auscert.org.au/bulletins/esb-2023.3138" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-32540" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2023-32540/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/94.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-15542" }, { "db": "VULMON", "id": "CVE-2023-32540" }, { "db": "CNNVD", "id": "CNNVD-202306-088" }, { "db": "NVD", "id": "CVE-2023-32540" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-15542" }, { "db": "VULMON", "id": "CVE-2023-32540" }, { "db": "CNNVD", "id": "CNNVD-202306-088" }, { "db": "NVD", "id": "CVE-2023-32540" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2024-15542" }, { "date": "2023-06-06T00:00:00", "db": "VULMON", "id": "CVE-2023-32540" }, { "date": "2023-06-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-088" }, { "date": "2023-06-06T00:15:10.067000", "db": "NVD", "id": "CVE-2023-32540" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2024-15542" }, { "date": "2023-06-06T00:00:00", "db": "VULMON", "id": "CVE-2023-32540" }, { "date": "2023-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-088" }, { "date": "2023-06-12T16:55:37.857000", "db": "NVD", "id": "CVE-2023-32540" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-088" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess/SCADA Arbitrary File Overwrite Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2024-15542" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-088" } ], "trust": 0.6 } }
cve-2023-32628
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: 0 < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "lessThanOrEqual": "v9.1.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "YangLiu from Elex Feigong Research Institute reported these vulnerabilities to CISA." } ], "datePublic": "2023-06-01T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e\n\n" } ], "value": "\n\n\n\n\nIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution.\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T23:14:00.388Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdvantech recommends WebAccess/SCADA users upgrade to \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en/support/details/installation?id=1-MS9MJV\"\u003ev9.1.4\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. \u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nAdvantech recommends WebAccess/SCADA users upgrade to v9.1.4 https://www.advantech.com/en/support/details/installation . \n\n\n" } ], "source": { "advisory": "ICSA-23-152-01", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-32628", "datePublished": "2023-06-05T23:14:00.388Z", "dateReserved": "2023-05-22T18:07:54.479Z", "dateUpdated": "2024-08-02T15:25:36.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22450
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: 0 < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "lessThanOrEqual": "v9.1.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "YangLiu from Elex Feigong Research Institute reported these vulnerabilities to CISA." } ], "datePublic": "2023-06-01T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution.\u003c/span\u003e\n\n\u003c/span\u003e\n\n" } ], "value": "\n\n\nIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution.\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T23:17:47.003Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdvantech recommends WebAccess/SCADA users upgrade to \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en/support/details/installation?id=1-MS9MJV\"\u003ev9.1.4\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. \u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nAdvantech recommends WebAccess/SCADA users upgrade to v9.1.4 https://www.advantech.com/en/support/details/installation . \n\n\n" } ], "source": { "advisory": "ICSA-23-152-01", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-22450", "datePublished": "2023-06-05T23:17:47.003Z", "dateReserved": "2023-05-22T18:07:54.484Z", "dateUpdated": "2024-08-02T10:13:48.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-6550
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-19-585/ | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: Versions 8.3.5 and prior. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:21.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-585/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "status": "affected", "version": "Versions 8.3.5 and prior." } ] } ], "datePublic": "2019-04-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-02T16:06:07", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-585/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-6550", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WebAccess/SCADA", "version": { "version_data": [ { "version_value": "Versions 8.3.5 and prior." } ] } } ] }, "vendor_name": "Advantech" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-585/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-585/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-6550", "datePublished": "2019-04-05T18:09:34", "dateReserved": "2019-01-22T00:00:00", "dateUpdated": "2024-08-04T20:23:21.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3975
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.tenable.com/security/research/tra-2019-41 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: 8.4.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:26:27.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2019-41" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "status": "affected", "version": "8.4.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated attacker to execute arbitrary code via a crafted IOCTL 70603 RPC message." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthenticated Remote Stack Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-10T15:55:33", "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "shortName": "tenable" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2019-41" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnreport@tenable.com", "ID": "CVE-2019-3975", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WebAccess/SCADA", "version": { "version_data": [ { "version_value": "8.4.1" } ] } } ] }, "vendor_name": "Advantech" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated attacker to execute arbitrary code via a crafted IOCTL 70603 RPC message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthenticated Remote Stack Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tenable.com/security/research/tra-2019-41", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2019-41" } ] } } } }, "cveMetadata": { "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "assignerShortName": "tenable", "cveId": "CVE-2019-3975", "datePublished": "2019-09-10T15:55:33", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:26:27.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-6552
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: Versions 8.3.5 and prior. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:22.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "status": "affected", "version": "Versions 8.3.5 and prior." } ] } ], "datePublic": "2019-04-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND (\u0027COMMAND INJECTION\u0027) CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-05T18:02:39", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-6552", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WebAccess/SCADA", "version": { "version_data": [ { "version_value": "Versions 8.3.5 and prior." } ] } } ] }, "vendor_name": "Advantech" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND (\u0027COMMAND INJECTION\u0027) CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-6552", "datePublished": "2019-04-05T18:02:39", "dateReserved": "2019-01-22T00:00:00", "dateUpdated": "2024-08-04T20:23:22.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32540
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: 0 < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "lessThanOrEqual": "v9.1.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "YangLiu from Elex Feigong Research Institute reported these vulnerabilities to CISA." } ], "datePublic": "2023-06-01T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution.\u003c/span\u003e\n\n" } ], "value": "\nIn Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T23:16:28.045Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-01" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdvantech recommends WebAccess/SCADA users upgrade to \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en/support/details/installation?id=1-MS9MJV\"\u003ev9.1.4\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. \u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nAdvantech recommends WebAccess/SCADA users upgrade to v9.1.4 https://www.advantech.com/en/support/details/installation . \n\n\n" } ], "source": { "advisory": "ICSA-23-152-01", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-32540", "datePublished": "2023-06-05T23:16:28.045Z", "dateReserved": "2023-05-22T18:07:54.491Z", "dateUpdated": "2024-08-02T15:18:37.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-6554
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: Versions 8.3.5 and prior. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:21.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "status": "affected", "version": "Versions 8.3.5 and prior." } ] } ], "datePublic": "2019-04-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may allow an attacker to cause a denial-of-service condition." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "IMPROPER ACCESS CONTROL CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-05T18:15:35", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-6554", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WebAccess/SCADA", "version": { "version_data": [ { "version_value": "Versions 8.3.5 and prior." } ] } } ] }, "vendor_name": "Advantech" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may allow an attacker to cause a denial-of-service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER ACCESS CONTROL CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-6554", "datePublished": "2019-04-05T18:15:35", "dateReserved": "2019-01-22T00:00:00", "dateUpdated": "2024-08-04T20:23:21.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1437
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: 0 < 9.1.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:49:11.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "lessThan": "9.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Florent Saudel" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAll versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.\u003c/p\u003e" } ], "value": "All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-822", "description": "CWE-822 Untrusted Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T14:34:24.399Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-02" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2023-1437", "x_generator": { "engine": "VINCE 2.1.3", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2023-1437" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-1437", "datePublished": "2023-08-02T22:30:43.978Z", "dateReserved": "2023-03-16T22:01:32.632Z", "dateUpdated": "2024-08-02T05:49:11.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2866
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: 8.4.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:33:06.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "status": "affected", "version": "8.4.5" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Marlon Luis Petry reported this vulnerability to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIf an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server. \u003c/span\u003e\n\n" } ], "value": "\nIf an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-351", "description": "CWE-351 Insufficient Type Distinction", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-07T20:12:46.824Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdvantech released a new \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en/support/details/installation?id=1-MS9MJV\"\u003eversion V9.1.4\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;to address the problem by not including these files.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nAdvantech released a new version V9.1.4 https://www.advantech.com/en/support/details/installation \u00a0to address the problem by not including these files.\n\n\n" } ], "source": { "discovery": "EXTERNAL" }, "title": "Advantech WebAccess Insufficient Type Distinction", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\u003cp\u003eAdvantech recommends users locate and delete the \u201cWADashboardSetup.msi\u201d file to avoid this issue.\u003c/p\u003e\u003cp\u003eIf\n users wish to remedy this problem in version 8.4.5, they can uninstall \n\"WebAccess Dashboard\" from the control panel. Delete all the files:\u003c/p\u003e\u003cp\u003e\\Inetpub\\wwwroot\\broadweb\\WADashboard\u003c/p\u003e\u003cp\u003e\\WebAccess\\Node\\WADashboardSetup.msi\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "Advantech recommends users locate and delete the \u201cWADashboardSetup.msi\u201d file to avoid this issue.\n\nIf\n users wish to remedy this problem in version 8.4.5, they can uninstall \n\"WebAccess Dashboard\" from the control panel. Delete all the files:\n\n\\Inetpub\\wwwroot\\broadweb\\WADashboard\n\n\\WebAccess\\Node\\WADashboardSetup.msi\n\n\n\n\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-2866", "datePublished": "2023-06-07T20:12:46.824Z", "dateReserved": "2023-05-24T14:09:39.667Z", "dateUpdated": "2024-08-02T06:33:06.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-2453
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01 | government-resource |
Vendor | Product | Version | |
---|---|---|---|
▼ | Advantech | WebAccess/SCADA |
Version: 9.1.5U |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-2453", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-08T15:03:48.290308Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-08T19:52:58.826Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:11:53.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "government-resource", "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WebAccess/SCADA", "vendor": "Advantech", "versions": [ { "status": "affected", "version": "9.1.5U" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "CISA discovered a public proof of concept as authored by Prze\u015blij Komentarz and reported it to Advantech." } ], "datePublic": "2024-03-21T21:23:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.\u003c/span\u003e\n\n" } ], "value": "\nThere is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-21T22:39:38.185Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdvantech recommends updating WebAccess/SCADA to version 9.1.6 or higher to mitigate this vulnerability.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nAdvantech recommends updating WebAccess/SCADA to version 9.1.6 or higher to mitigate this vulnerability.\n\n" } ], "source": { "advisory": "ICSA-24-081-01", "discovery": "EXTERNAL" }, "title": "Advantech WebAccess/SCADA SQL Injection", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-2453", "datePublished": "2024-03-21T22:39:15.488Z", "dateReserved": "2024-03-14T15:12:14.027Z", "dateUpdated": "2024-08-01T19:11:53.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }