var-202005-1246
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x520B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess/scada", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "credits": { "_id": null, "data": "Z0mb1E", "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ], "trust": 0.7 }, "cvss": { "_id": null, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "ZDI-20-606", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-606", "trust": 0.7, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "description": { "_id": null, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x520B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.", "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ], "trust": 0.7 }, "external_ids": { "_id": null, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-9935", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-606", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "id": "VAR-202005-1246", "iot": { "_id": null, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6405517 }, "last_update_date": "2022-05-17T01:40:54.071000Z", "patch": { "_id": null, "data": [ { "title": "Advantech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "references": { "_id": null, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-20-606", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-606", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-05-08T00:00:00", "db": "ZDI", "id": "ZDI-20-606", "ident": null } ] }, "title": { "_id": null, "data": "Advantech WebAccess/SCADA DATACORE IOCTL 0x520B Heap-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-606" } ], "trust": 0.7 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.