Search criteria
107 vulnerabilities found for WebAccess/SCADA by Advantech
VAR-201904-0181
Vulnerability from variot - Updated: 2025-12-22 23:55Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within BwSyncLg.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "webaccess",
"scope": null,
"trust": 9.8,
"vendor": "advantech",
"version": null
},
{
"_id": null,
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3.5"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=8.3.5"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-316"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-312"
},
{
"db": "ZDI",
"id": "ZDI-19-321"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-319"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-309"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"credits": {
"_id": null,
"data": "Mat Powell of Trend Micro Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-316"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-312"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-319"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-309"
}
],
"trust": 9.1
},
"cve": "CVE-2019-6550",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2019-6550",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-08948",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157985",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6550",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 9.8,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6550",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2019-6550",
"trust": 9.8,
"value": "CRITICAL"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2019-6550",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-08948",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201904-089",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-157985",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-316"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-312"
},
{
"db": "ZDI",
"id": "ZDI-19-321"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-319"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-309"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "VULHUB",
"id": "VHN-157985"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"description": {
"_id": null,
"data": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within BwSyncLg.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6550"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-309"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-319"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-321"
},
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-312"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-316"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "VULHUB",
"id": "VHN-157985"
}
],
"trust": 10.53
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2019-6550",
"trust": 12.3
},
{
"db": "ICS CERT",
"id": "ICSA-19-092-01",
"trust": 2.3
},
{
"db": "ZDI",
"id": "ZDI-19-585",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-08948",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7914",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-322",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7899",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-311",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7924",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-329",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7927",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-325",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7901",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-313",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7904",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-316",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7913",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-320",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7910",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-318",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7900",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-312",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7920",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-321",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7903",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-315",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7912",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-319",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7925",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-323",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7885",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-309",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-330",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.1113",
"trust": 0.6
},
{
"db": "BID",
"id": "107675",
"trust": 0.6
},
{
"db": "IVD",
"id": "4D85A7A9-A091-4C59-84E6-73C8B6639498",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157985",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-316"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-312"
},
{
"db": "ZDI",
"id": "ZDI-19-321"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-319"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-309"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "VULHUB",
"id": "VHN-157985"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"id": "VAR-201904-0181",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "VULHUB",
"id": "VHN-157985"
}
],
"trust": 1.4466745799999998
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
}
]
},
"last_update_date": "2025-12-22T23:55:40.719000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 6.3,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-091-01"
},
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 3.5,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01"
},
{
"title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/157945"
},
{
"title": "Advantech WebAccess/SCADA Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91013"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-316"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-312"
},
{
"db": "ZDI",
"id": "ZDI-19-321"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-319"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-309"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "CWE-119",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157985"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 6.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-091-01"
},
{
"trust": 5.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-585/"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/107675"
},
{
"trust": 0.6,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.6,
"url": "https://www.advantech.com/"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6550"
},
{
"trust": 0.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-330/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/78318"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-322"
},
{
"db": "ZDI",
"id": "ZDI-19-311"
},
{
"db": "ZDI",
"id": "ZDI-19-329"
},
{
"db": "ZDI",
"id": "ZDI-19-325"
},
{
"db": "ZDI",
"id": "ZDI-19-313"
},
{
"db": "ZDI",
"id": "ZDI-19-316"
},
{
"db": "ZDI",
"id": "ZDI-19-320"
},
{
"db": "ZDI",
"id": "ZDI-19-318"
},
{
"db": "ZDI",
"id": "ZDI-19-312"
},
{
"db": "ZDI",
"id": "ZDI-19-321"
},
{
"db": "ZDI",
"id": "ZDI-19-315"
},
{
"db": "ZDI",
"id": "ZDI-19-319"
},
{
"db": "ZDI",
"id": "ZDI-19-323"
},
{
"db": "ZDI",
"id": "ZDI-19-309"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
},
{
"db": "VULHUB",
"id": "VHN-157985"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
},
{
"db": "NVD",
"id": "CVE-2019-6550"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-322",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-311",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-329",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-325",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-313",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-316",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-320",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-318",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-312",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-321",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-315",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-319",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-323",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-309",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2019-08948",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-157985",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2019-6550",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2019-04-03T00:00:00",
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-322",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-311",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-329",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-325",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-313",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-316",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-320",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-318",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-312",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-321",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-315",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-319",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-323",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-309",
"ident": null
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08948",
"ident": null
},
{
"date": "2019-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157985",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-089",
"ident": null
},
{
"date": "2019-04-05T19:29:00.310000",
"db": "NVD",
"id": "CVE-2019-6550",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-322",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-311",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-329",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-325",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-313",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-316",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-320",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-318",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-312",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-321",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-315",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-319",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-323",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-309",
"ident": null
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08948",
"ident": null
},
{
"date": "2020-10-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157985",
"ident": null
},
{
"date": "2020-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-089",
"ident": null
},
{
"date": "2024-11-21T04:46:40.660000",
"db": "NVD",
"id": "CVE-2019-6550",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Advantech WebAccess/SCADA Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "CNVD",
"id": "CNVD-2019-08948"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "4d85a7a9-a091-4c59-84e6-73c8b6639498"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-089"
}
],
"trust": 0.8
}
}
VAR-201906-1029
Vulnerability from variot - Updated: 2025-12-22 23:52In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. Multiple heap-based buffer-overflow vulnerabilities 4. An information disclosure vulnerability 5. Multiple remote-code execution vulnerabilities An attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (â??../â??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. Advantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "webaccess",
"scope": null,
"trust": 9.1,
"vendor": "advantech",
"version": null
},
{
"_id": null,
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3.5"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=8.3.5"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.1"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.0"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "7.2"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.4.1"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-612"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-614"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-617"
},
{
"db": "ZDI",
"id": "ZDI-19-600"
},
{
"db": "ZDI",
"id": "ZDI-19-597"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "BID",
"id": "108923"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"credits": {
"_id": null,
"data": "Natnael Samson (@NattiSamson)",
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-612"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-614"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-617"
},
{
"db": "ZDI",
"id": "ZDI-19-600"
},
{
"db": "ZDI",
"id": "ZDI-19-597"
}
],
"trust": 9.1
},
"cve": "CVE-2019-10993",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2019-10993",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32473",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-142595",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-10993",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 9.1,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-10993",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2019-10993",
"trust": 9.1,
"value": "CRITICAL"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2019-10993",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2019-32473",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201906-1077",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-142595",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-612"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-614"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-617"
},
{
"db": "ZDI",
"id": "ZDI-19-600"
},
{
"db": "ZDI",
"id": "ZDI-19-597"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "VULHUB",
"id": "VHN-142595"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"description": {
"_id": null,
"data": "In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following security vulnerabilities:\n1. A directory-traversal vulnerability\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. Multiple heap-based buffer-overflow vulnerabilities\n4. An information disclosure vulnerability\n5. Multiple remote-code execution vulnerabilities\nAn attacker can exploit these issues to execute arbitrary code in the context of the application, modify and delete files, use directory-traversal sequences (\u00e2??../\u00e2??) to retrieve arbitrary files, escalate privileges and perform certain unauthorized actions or obtain sensitive information. This may aid in further attacks. \nAdvantech WebAccess/SCADA Versions 8.3.5 and prior versions are vulnerable. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-10993"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-597"
},
{
"db": "ZDI",
"id": "ZDI-19-600"
},
{
"db": "ZDI",
"id": "ZDI-19-617"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-614"
},
{
"db": "ZDI",
"id": "ZDI-19-612"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "BID",
"id": "108923"
},
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "VULHUB",
"id": "VHN-142595"
}
],
"trust": 10.17
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2019-10993",
"trust": 11.9
},
{
"db": "ZDI",
"id": "ZDI-19-613",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-616",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-606",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-612",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-605",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-614",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-617",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-19-597",
"trust": 2.4
},
{
"db": "ICS CERT",
"id": "ICSA-19-178-05",
"trust": 2.0
},
{
"db": "ZDI",
"id": "ZDI-19-611",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-615",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-602",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-607",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-598",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-603",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-618",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-601",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-19-623",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077",
"trust": 0.9
},
{
"db": "BID",
"id": "108923",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32473",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-599",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-610",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-595",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-596",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-19-600",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8129",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8146",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8143",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8150",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8139",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8118",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8145",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8138",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8147",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8126",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8151",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8130",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-8127",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.2350",
"trust": 0.6
},
{
"db": "IVD",
"id": "D5DCD84F-1ACA-4DC3-AC16-D5C7C3DD4D07",
"trust": 0.2
},
{
"db": "ZDI",
"id": "ZDI-19-604",
"trust": 0.1
},
{
"db": "ZDI",
"id": "ZDI-19-593",
"trust": 0.1
},
{
"db": "ZDI",
"id": "ZDI-19-609",
"trust": 0.1
},
{
"db": "ZDI",
"id": "ZDI-19-608",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-142595",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-612"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-614"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-617"
},
{
"db": "ZDI",
"id": "ZDI-19-600"
},
{
"db": "ZDI",
"id": "ZDI-19-597"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "VULHUB",
"id": "VHN-142595"
},
{
"db": "BID",
"id": "108923"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"id": "VAR-201906-1029",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "VULHUB",
"id": "VHN-142595"
}
],
"trust": 1.4466745799999998
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
}
]
},
"last_update_date": "2025-12-22T23:52:37.978000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 9.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05"
},
{
"title": "Patch for Advantech WebAccess/SCADA arbitrary code execution vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/181487"
},
{
"title": "Advantech WebAccess/SCADA Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94180"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-612"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-614"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-617"
},
{
"db": "ZDI",
"id": "ZDI-19-600"
},
{
"db": "ZDI",
"id": "ZDI-19-597"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-119",
"trust": 1.0
},
{
"problemtype": "CWE-476",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-142595"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 11.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-178-05"
},
{
"trust": 2.3,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-623/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-597/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-598/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-601/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-602/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-603/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-605/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-606/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-607/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-611/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-612/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-613/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-614/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-615/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-616/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-617/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-618/"
},
{
"trust": 1.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-10993"
},
{
"trust": 0.9,
"url": "http://webaccess.advantech.com"
},
{
"trust": 0.6,
"url": "https://www.securityfocus.com/bid/108923"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.2350/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-593/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-595/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-596/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-599/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-600/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-604/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-608/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-609/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-610/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-599"
},
{
"db": "ZDI",
"id": "ZDI-19-613"
},
{
"db": "ZDI",
"id": "ZDI-19-610"
},
{
"db": "ZDI",
"id": "ZDI-19-616"
},
{
"db": "ZDI",
"id": "ZDI-19-606"
},
{
"db": "ZDI",
"id": "ZDI-19-595"
},
{
"db": "ZDI",
"id": "ZDI-19-612"
},
{
"db": "ZDI",
"id": "ZDI-19-605"
},
{
"db": "ZDI",
"id": "ZDI-19-614"
},
{
"db": "ZDI",
"id": "ZDI-19-596"
},
{
"db": "ZDI",
"id": "ZDI-19-617"
},
{
"db": "ZDI",
"id": "ZDI-19-600"
},
{
"db": "ZDI",
"id": "ZDI-19-597"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
},
{
"db": "VULHUB",
"id": "VHN-142595"
},
{
"db": "BID",
"id": "108923"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
},
{
"db": "NVD",
"id": "CVE-2019-10993"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-599",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-613",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-610",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-616",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-606",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-595",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-612",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-605",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-614",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-596",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-617",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-600",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-597",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2019-32473",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-142595",
"ident": null
},
{
"db": "BID",
"id": "108923",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201906-1077",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2019-10993",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-599",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-613",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-610",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-616",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-606",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-595",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-612",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-605",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-614",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-596",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-617",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-600",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-597",
"ident": null
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32473",
"ident": null
},
{
"date": "2019-06-28T00:00:00",
"db": "VULHUB",
"id": "VHN-142595",
"ident": null
},
{
"date": "2019-06-27T00:00:00",
"db": "BID",
"id": "108923",
"ident": null
},
{
"date": "2019-06-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-1077",
"ident": null
},
{
"date": "2019-06-28T21:15:11.353000",
"db": "NVD",
"id": "CVE-2019-10993",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-599",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-613",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-610",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-616",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-606",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-595",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-612",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-605",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-614",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-596",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-617",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-600",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-597",
"ident": null
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32473",
"ident": null
},
{
"date": "2019-07-02T00:00:00",
"db": "VULHUB",
"id": "VHN-142595",
"ident": null
},
{
"date": "2019-06-27T00:00:00",
"db": "BID",
"id": "108923",
"ident": null
},
{
"date": "2022-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-1077",
"ident": null
},
{
"date": "2024-11-21T04:20:18.740000",
"db": "NVD",
"id": "CVE-2019-10993",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Advantech WebAccess/SCADA Arbitrary code execution vulnerability",
"sources": [
{
"db": "IVD",
"id": "d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07"
},
{
"db": "CNVD",
"id": "CNVD-2019-32473"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-1077"
}
],
"trust": 0.6
}
}
VAR-202005-0008
Vulnerability from variot - Updated: 2025-12-22 23:52Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00005226 in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is due to the fact that the program does not correctly verify the length of the data submitted by the user
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "webaccess/scada",
"scope": null,
"trust": 8.4,
"vendor": "advantech",
"version": null
},
{
"_id": null,
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.4"
},
{
"_id": null,
"model": "webaccess",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.0"
},
{
"_id": null,
"model": "webaccess node",
"scope": "gte",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.4"
},
{
"_id": null,
"model": "webaccess node",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.0"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "webaccess",
"version": "9.0.0"
}
],
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-604"
},
{
"db": "ZDI",
"id": "ZDI-20-594"
},
{
"db": "ZDI",
"id": "ZDI-20-635"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "ZDI",
"id": "ZDI-20-596"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"credits": {
"_id": null,
"data": "Z0mb1E",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-604"
},
{
"db": "ZDI",
"id": "ZDI-20-594"
},
{
"db": "ZDI",
"id": "ZDI-20-635"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "ZDI",
"id": "ZDI-20-596"
}
],
"trust": 8.4
},
"cve": "CVE-2020-10638",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-10638",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-29739",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-163136",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-10638",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 7.7,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-10638",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2020-10638",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-10638",
"trust": 7.7,
"value": "CRITICAL"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2020-10638",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "ZDI",
"id": "CVE-2020-10638",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2020-29739",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202005-295",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-163136",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-10638",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-604"
},
{
"db": "ZDI",
"id": "ZDI-20-594"
},
{
"db": "ZDI",
"id": "ZDI-20-635"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "ZDI",
"id": "ZDI-20-596"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "VULHUB",
"id": "VHN-163136"
},
{
"db": "VULMON",
"id": "CVE-2020-10638"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
},
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"description": {
"_id": null,
"data": "Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00005226 in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is due to the fact that the program does not correctly verify the length of the data submitted by the user",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-10638"
},
{
"db": "ZDI",
"id": "ZDI-20-604"
},
{
"db": "ZDI",
"id": "ZDI-20-596"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-594"
},
{
"db": "ZDI",
"id": "ZDI-20-635"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "VULHUB",
"id": "VHN-163136"
},
{
"db": "VULMON",
"id": "CVE-2020-10638"
}
],
"trust": 9.54
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-10638",
"trust": 11.2
},
{
"db": "ZDI",
"id": "ZDI-20-593",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-599",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-603",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-20-616",
"trust": 2.5
},
{
"db": "ICS CERT",
"id": "ICSA-20-128-01",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-20-600",
"trust": 1.8
},
{
"db": "ZDI",
"id": "ZDI-20-621",
"trust": 1.8
},
{
"db": "ZDI",
"id": "ZDI-20-635",
"trust": 1.4
},
{
"db": "CNVD",
"id": "CNVD-2020-29739",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295",
"trust": 1.1
},
{
"db": "ZDI",
"id": "ZDI-20-597",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-20-631",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-20-604",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-20-594",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-20-617",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-20-618",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-20-596",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9902",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9985",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9994",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9892",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9897",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9898",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9904",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-10026",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9890",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9891",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9889",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-9908",
"trust": 0.7
},
{
"db": "NSFOCUS",
"id": "47382",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.1646",
"trust": 0.6
},
{
"db": "IVD",
"id": "95F15ED9-ABD1-4FA7-B3B8-CCE038C93754",
"trust": 0.2
},
{
"db": "IVD",
"id": "619B16C7-A995-4CDF-B7BE-D91E2BDC75EC",
"trust": 0.2
},
{
"db": "ZDI",
"id": "ZDI-20-601",
"trust": 0.1
},
{
"db": "ZDI",
"id": "ZDI-20-620",
"trust": 0.1
},
{
"db": "ZDI",
"id": "ZDI-20-602",
"trust": 0.1
},
{
"db": "ZDI",
"id": "ZDI-20-623",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-163136",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-10638",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-604"
},
{
"db": "ZDI",
"id": "ZDI-20-594"
},
{
"db": "ZDI",
"id": "ZDI-20-635"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "ZDI",
"id": "ZDI-20-596"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "VULHUB",
"id": "VHN-163136"
},
{
"db": "VULMON",
"id": "CVE-2020-10638"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
},
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"id": "VAR-202005-0008",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "VULHUB",
"id": "VHN-163136"
}
],
"trust": 1.679503486666667
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
}
]
},
"last_update_date": "2025-12-22T23:52:36.251000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 8.4,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"title": "Patch for Advantech WebAccess Node buffer overflow vulnerability (CNVD-2020-29739)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/218845"
},
{
"title": "Advantech WebAccess Node Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=118647"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-604"
},
{
"db": "ZDI",
"id": "ZDI-20-594"
},
{
"db": "ZDI",
"id": "ZDI-20-635"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "ZDI",
"id": "ZDI-20-596"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-122",
"trust": 1.0
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-163136"
},
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 8.4,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-36"
},
{
"trust": 3.0,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-128-01"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-593/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-599/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-600/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-603/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-616/"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-621/"
},
{
"trust": 0.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-635/"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-10638"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47382"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.1646/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-594/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-596/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-597/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-601/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-602/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-604/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-617/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-618/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-620/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-623/"
},
{
"trust": 0.1,
"url": "https://www.zerodayinitiative.com/advisories/zdi-20-631/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181596"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-593"
},
{
"db": "ZDI",
"id": "ZDI-20-597"
},
{
"db": "ZDI",
"id": "ZDI-20-599"
},
{
"db": "ZDI",
"id": "ZDI-20-631"
},
{
"db": "ZDI",
"id": "ZDI-20-603"
},
{
"db": "ZDI",
"id": "ZDI-20-604"
},
{
"db": "ZDI",
"id": "ZDI-20-594"
},
{
"db": "ZDI",
"id": "ZDI-20-635"
},
{
"db": "ZDI",
"id": "ZDI-20-617"
},
{
"db": "ZDI",
"id": "ZDI-20-618"
},
{
"db": "ZDI",
"id": "ZDI-20-616"
},
{
"db": "ZDI",
"id": "ZDI-20-596"
},
{
"db": "CNVD",
"id": "CNVD-2020-29739"
},
{
"db": "VULHUB",
"id": "VHN-163136"
},
{
"db": "VULMON",
"id": "CVE-2020-10638"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
},
{
"db": "NVD",
"id": "CVE-2020-10638"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
"ident": null
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-593",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-597",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-599",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-631",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-603",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-604",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-594",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-635",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-617",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-618",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-616",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-20-596",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2020-29739",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-163136",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2020-10638",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-10638",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754",
"ident": null
},
{
"date": "2020-05-07T00:00:00",
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-593",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-597",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-599",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-631",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-603",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-604",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-594",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-635",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-617",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-618",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-616",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-596",
"ident": null
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29739",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-163136",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "VULMON",
"id": "CVE-2020-10638",
"ident": null
},
{
"date": "2020-05-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-295",
"ident": null
},
{
"date": "2020-05-08T12:15:11.067000",
"db": "NVD",
"id": "CVE-2020-10638",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-593",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-597",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-599",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-631",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-603",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-604",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-594",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-635",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-617",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-618",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-616",
"ident": null
},
{
"date": "2020-05-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-596",
"ident": null
},
{
"date": "2020-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-29739",
"ident": null
},
{
"date": "2021-12-17T00:00:00",
"db": "VULHUB",
"id": "VHN-163136",
"ident": null
},
{
"date": "2020-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2020-10638",
"ident": null
},
{
"date": "2021-01-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202005-295",
"ident": null
},
{
"date": "2024-11-21T04:55:45.027000",
"db": "NVD",
"id": "CVE-2020-10638",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Advantech WebAccess/SCADA ViewSrv IOCTL 0x00002723 Heap-based Buffer Overflow Remote Code Execution Vulnerability",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-593"
}
],
"trust": 0.7
},
"type": {
"_id": null,
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "95f15ed9-abd1-4fa7-b3b8-cce038c93754"
},
{
"db": "IVD",
"id": "619b16c7-a995-4cdf-b7be-d91e2bdc75ec"
},
{
"db": "CNNVD",
"id": "CNNVD-202005-295"
}
],
"trust": 1.0
}
}
VAR-201812-0480
Vulnerability from variot - Updated: 2024-11-23 22:58WebAccess/SCADA, WebAccess/SCADA Version 8.3.2 installed on Windows 2008 R2 SP1. Lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer on the stack. WebAccess/SCADA Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment.
A buffer overflow vulnerability exists in Advantech WebAccess/SCADA version 8.3.2 based on the Windows 2008 R2 SP1 platform that could allow an attacker to execute arbitrary code or cause a denial of service in the context of an affected application. Advantech WebAccess/SCADA is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Failed exploit attempts will likely cause denial-of-service conditions. Advantech WebAccess/SCADA version 8.3.2 is vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201812-0480",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.7,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.6,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "8.3.2"
}
],
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Jacob Baines of Tenable Network Security",
"sources": [
{
"db": "BID",
"id": "106245"
}
],
"trust": 0.3
},
"cve": "CVE-2018-18999",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2018-18999",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32478",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-129614",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2018-18999",
"impactScore": 3.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "Low",
"baseScore": 7.3,
"baseSeverity": "High",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2018-18999",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-18999",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2018-18999",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2019-32478",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201812-789",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-129614",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA, WebAccess/SCADA Version 8.3.2 installed on Windows 2008 R2 SP1. Lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer on the stack. WebAccess/SCADA Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. \n\nA buffer overflow vulnerability exists in Advantech WebAccess/SCADA version 8.3.2 based on the Windows 2008 R2 SP1 platform that could allow an attacker to execute arbitrary code or cause a denial of service in the context of an affected application. Advantech WebAccess/SCADA is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Failed exploit attempts will likely cause denial-of-service conditions. \nAdvantech WebAccess/SCADA version 8.3.2 is vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-18999"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "VULHUB",
"id": "VHN-129614"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-18999",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-18-352-02",
"trust": 3.4
},
{
"db": "BID",
"id": "106245",
"trust": 2.0
},
{
"db": "TENABLE",
"id": "TRA-2018-45",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32478",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453",
"trust": 0.8
},
{
"db": "IVD",
"id": "7B46AEC3-E0F9-4EAE-BEB8-00887207FB47",
"trust": 0.2
},
{
"db": "SEEBUG",
"id": "SSVID-97745",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-98830",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-129614",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"id": "VAR-201812-0480",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
}
],
"trust": 1.5586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
}
]
},
"last_update_date": "2024-11-23T22:58:48.600000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-32478)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/181475"
},
{
"title": "Advantech WebAccess/SCADA Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87986"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
},
{
"problemtype": "CWE-787",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-352-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/106245"
},
{
"trust": 1.7,
"url": "https://www.tenable.com/security/research/tra-2018-45"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18999"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-18999"
},
{
"trust": 0.3,
"url": "http://www.advantech.in/"
},
{
"trust": 0.3,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"db": "VULHUB",
"id": "VHN-129614"
},
{
"db": "BID",
"id": "106245"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
},
{
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "7b46aec3-e0f9-4eae-beb8-00887207fb47"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"date": "2018-12-19T00:00:00",
"db": "VULHUB",
"id": "VHN-129614"
},
{
"date": "2018-12-18T00:00:00",
"db": "BID",
"id": "106245"
},
{
"date": "2019-02-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"date": "2018-12-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-789"
},
{
"date": "2018-12-19T18:29:00.203000",
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-11-07T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32478"
},
{
"date": "2020-09-18T00:00:00",
"db": "VULHUB",
"id": "VHN-129614"
},
{
"date": "2018-12-18T00:00:00",
"db": "BID",
"id": "106245"
},
{
"date": "2019-02-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013453"
},
{
"date": "2020-09-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-789"
},
{
"date": "2024-11-21T03:57:00.923000",
"db": "NVD",
"id": "CVE-2018-18999"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA Input validation vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013453"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-789"
}
],
"trust": 0.6
}
}
VAR-201909-0221
Vulnerability from variot - Updated: 2024-11-23 22:41Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated attacker to execute arbitrary code via a crafted IOCTL 70603 RPC message. Advantech WebAccess/SCADA Contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer error vulnerability exists in Advantech WebAccess/SCADA version 8.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201909-0221",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.4,
"vendor": "advantech",
"version": "8.4.1"
},
{
"model": "webaccess",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "8.4.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "8.4.1"
}
],
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
}
]
},
"cve": "CVE-2019-3975",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2019-3975",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32466",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-155410",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-3975",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-3975",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-3975",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2019-3975",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2019-32466",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201909-431",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-155410",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated attacker to execute arbitrary code via a crafted IOCTL 70603 RPC message. Advantech WebAccess/SCADA Contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer error vulnerability exists in Advantech WebAccess/SCADA version 8.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3975"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "VULHUB",
"id": "VHN-155410"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-3975",
"trust": 3.3
},
{
"db": "TENABLE",
"id": "TRA-2019-41",
"trust": 2.5
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32466",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167",
"trust": 0.8
},
{
"db": "IVD",
"id": "6779568D-C80F-445B-BA8E-FA61163D09AD",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-155410",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"id": "VAR-201909-0221",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
}
],
"trust": 1.4466745799999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
}
]
},
"last_update_date": "2024-11-23T22:41:21.068000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for Advantech WebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-32466)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/181499"
},
{
"title": "Advantech WebAccess/SCADA Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98025"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "CWE-120",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.tenable.com/security/research/tra-2019-41"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3975"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3975"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"db": "VULHUB",
"id": "VHN-155410"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
},
{
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"date": "2019-09-10T00:00:00",
"db": "VULHUB",
"id": "VHN-155410"
},
{
"date": "2019-09-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"date": "2019-09-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201909-431"
},
{
"date": "2019-09-10T16:15:12.667000",
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32466"
},
{
"date": "2019-09-11T00:00:00",
"db": "VULHUB",
"id": "VHN-155410"
},
{
"date": "2019-09-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-009167"
},
{
"date": "2021-07-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201909-431"
},
{
"date": "2024-11-21T04:42:59.290000",
"db": "NVD",
"id": "CVE-2019-3975"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Vulnerable to classic buffer overflow",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-009167"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "6779568d-c80f-445b-ba8e-fa61163d09ad"
},
{
"db": "CNNVD",
"id": "CNNVD-201909-431"
}
],
"trust": 0.8
}
}
VAR-202102-0022
Vulnerability from variot - Updated: 2024-11-23 22:40An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via multiple service executables in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202102-0022",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11305"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"db": "NVD",
"id": "CVE-2020-13552"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovered by Yuri Kramarz of Cisco Talos.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1259"
}
],
"trust": 0.6
},
"cve": "CVE-2020-13552",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-13552",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-11305",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-166342",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "talos-cna@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"id": "CVE-2020-13552",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"id": "CVE-2020-13552",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-13552",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "talos-cna@cisco.com",
"id": "CVE-2020-13552",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-13552",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-11305",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-1259",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-166342",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11305"
},
{
"db": "VULHUB",
"id": "VHN-166342"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1259"
},
{
"db": "NVD",
"id": "CVE-2020-13552"
},
{
"db": "NVD",
"id": "CVE-2020-13552"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via multiple service executables in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-13552"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"db": "CNVD",
"id": "CNVD-2021-11305"
},
{
"db": "VULHUB",
"id": "VHN-166342"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "TALOS",
"id": "TALOS-2020-1169",
"trust": 3.1
},
{
"db": "NVD",
"id": "CVE-2020-13552",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016182",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-11305",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1259",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-166342",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11305"
},
{
"db": "VULHUB",
"id": "VHN-166342"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1259"
},
{
"db": "NVD",
"id": "CVE-2020-13552"
}
]
},
"id": "VAR-202102-0022",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11305"
},
{
"db": "VULHUB",
"id": "VHN-166342"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11305"
}
]
},
"last_update_date": "2024-11-23T22:40:46.773000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Advantech WebAccess/SCADA Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142126"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1259"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-276",
"trust": 1.1
},
{
"problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]",
"trust": 0.8
},
{
"problemtype": "CWE-269",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-166342"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"db": "NVD",
"id": "CVE-2020-13552"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13552"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11305"
},
{
"db": "VULHUB",
"id": "VHN-166342"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1259"
},
{
"db": "NVD",
"id": "CVE-2020-13552"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-11305"
},
{
"db": "VULHUB",
"id": "VHN-166342"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1259"
},
{
"db": "NVD",
"id": "CVE-2020-13552"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11305"
},
{
"date": "2021-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-166342"
},
{
"date": "2021-11-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"date": "2021-02-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1259"
},
{
"date": "2021-02-17T19:15:12.450000",
"db": "NVD",
"id": "CVE-2020-13552"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11305"
},
{
"date": "2022-06-29T00:00:00",
"db": "VULHUB",
"id": "VHN-166342"
},
{
"date": "2021-11-12T01:22:00",
"db": "JVNDB",
"id": "JVNDB-2020-016182"
},
{
"date": "2022-04-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1259"
},
{
"date": "2024-11-21T05:01:28.920000",
"db": "NVD",
"id": "CVE-2020-13552"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1259"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech\u00a0WebAccess/SCADA\u00a0 Vulnerability in privilege management",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016182"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1259"
}
],
"trust": 0.6
}
}
VAR-202103-0009
Vulnerability from variot - Updated: 2024-11-23 22:40An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Is vulnerable to incorrect default permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202103-0009",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11307"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"db": "NVD",
"id": "CVE-2020-13554"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovered by Yuri Kramarz of Cisco Talos.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1264"
}
],
"trust": 0.6
},
"cve": "CVE-2020-13554",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-13554",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-11307",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-166344",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-13554",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "talos-cna@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"id": "CVE-2020-13554",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-13554",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-13554",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "talos-cna@cisco.com",
"id": "CVE-2020-13554",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-13554",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-11307",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-1264",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-166344",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11307"
},
{
"db": "VULHUB",
"id": "VHN-166344"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1264"
},
{
"db": "NVD",
"id": "CVE-2020-13554"
},
{
"db": "NVD",
"id": "CVE-2020-13554"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Is vulnerable to incorrect default permissions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-13554"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"db": "CNVD",
"id": "CNVD-2021-11307"
},
{
"db": "VULHUB",
"id": "VHN-166344"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "TALOS",
"id": "TALOS-2020-1169",
"trust": 3.1
},
{
"db": "NVD",
"id": "CVE-2020-13554",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016164",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-11307",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1264",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-166344",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11307"
},
{
"db": "VULHUB",
"id": "VHN-166344"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1264"
},
{
"db": "NVD",
"id": "CVE-2020-13554"
}
]
},
"id": "VAR-202103-0009",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11307"
},
{
"db": "VULHUB",
"id": "VHN-166344"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11307"
}
]
},
"last_update_date": "2024-11-23T22:40:46.743000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "https://www.advantech.tw/support/details/installation?id=1-MS9MJV"
},
{
"title": "Multiple Advantech Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=143433"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1264"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-276",
"trust": 1.1
},
{
"problemtype": "Inappropriate default permissions (CWE-276) [NVD Evaluation ]",
"trust": 0.8
},
{
"problemtype": "CWE-269",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-166344"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"db": "NVD",
"id": "CVE-2020-13554"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13554"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11307"
},
{
"db": "VULHUB",
"id": "VHN-166344"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1264"
},
{
"db": "NVD",
"id": "CVE-2020-13554"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-11307"
},
{
"db": "VULHUB",
"id": "VHN-166344"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1264"
},
{
"db": "NVD",
"id": "CVE-2020-13554"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11307"
},
{
"date": "2021-03-03T00:00:00",
"db": "VULHUB",
"id": "VHN-166344"
},
{
"date": "2021-11-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"date": "2021-02-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1264"
},
{
"date": "2021-03-03T17:15:11.487000",
"db": "NVD",
"id": "CVE-2020-13554"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11307"
},
{
"date": "2022-09-30T00:00:00",
"db": "VULHUB",
"id": "VHN-166344"
},
{
"date": "2021-11-11T08:23:00",
"db": "JVNDB",
"id": "JVNDB-2020-016164"
},
{
"date": "2022-04-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1264"
},
{
"date": "2024-11-21T05:01:29.170000",
"db": "NVD",
"id": "CVE-2020-13554"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1264"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech\u00a0WebAccess/SCADA\u00a0 Inappropriate Default Permission Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016164"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1264"
}
],
"trust": 0.6
}
}
VAR-202102-0023
Vulnerability from variot - Updated: 2024-11-23 22:40An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202102-0023",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11306"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"db": "NVD",
"id": "CVE-2020-13553"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovered by Yuri Kramarz of Cisco Talos.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1260"
}
],
"trust": 0.6
},
"cve": "CVE-2020-13553",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-13553",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-11306",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-166343",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "talos-cna@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"id": "CVE-2020-13553",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"id": "CVE-2020-13553",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-13553",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "talos-cna@cisco.com",
"id": "CVE-2020-13553",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-13553",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-11306",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-1260",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-166343",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11306"
},
{
"db": "VULHUB",
"id": "VHN-166343"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1260"
},
{
"db": "NVD",
"id": "CVE-2020-13553"
},
{
"db": "NVD",
"id": "CVE-2020-13553"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-13553"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"db": "CNVD",
"id": "CNVD-2021-11306"
},
{
"db": "VULHUB",
"id": "VHN-166343"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-13553",
"trust": 3.1
},
{
"db": "TALOS",
"id": "TALOS-2020-1169",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016181",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-11306",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1260",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-166343",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11306"
},
{
"db": "VULHUB",
"id": "VHN-166343"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1260"
},
{
"db": "NVD",
"id": "CVE-2020-13553"
}
]
},
"id": "VAR-202102-0023",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11306"
},
{
"db": "VULHUB",
"id": "VHN-166343"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11306"
}
]
},
"last_update_date": "2024-11-23T22:40:46.713000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Advantech WebAccess/SCADA Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142127"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1260"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-276",
"trust": 1.1
},
{
"problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]",
"trust": 0.8
},
{
"problemtype": "CWE-269",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-166343"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"db": "NVD",
"id": "CVE-2020-13553"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13553"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11306"
},
{
"db": "VULHUB",
"id": "VHN-166343"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1260"
},
{
"db": "NVD",
"id": "CVE-2020-13553"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-11306"
},
{
"db": "VULHUB",
"id": "VHN-166343"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1260"
},
{
"db": "NVD",
"id": "CVE-2020-13553"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11306"
},
{
"date": "2021-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-166343"
},
{
"date": "2021-11-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"date": "2021-02-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1260"
},
{
"date": "2021-02-17T19:15:12.510000",
"db": "NVD",
"id": "CVE-2020-13553"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11306"
},
{
"date": "2022-06-29T00:00:00",
"db": "VULHUB",
"id": "VHN-166343"
},
{
"date": "2021-11-12T01:08:00",
"db": "JVNDB",
"id": "JVNDB-2020-016181"
},
{
"date": "2022-04-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1260"
},
{
"date": "2024-11-21T05:01:29.047000",
"db": "NVD",
"id": "CVE-2020-13553"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1260"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech\u00a0WebAccess/SCADA\u00a0 Vulnerability in privilege management",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016181"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1260"
}
],
"trust": 0.6
}
}
VAR-202102-0024
Vulnerability from variot - Updated: 2024-11-23 22:40An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202102-0024",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11308"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"db": "NVD",
"id": "CVE-2020-13555"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovered by Yuri Kramarz of Cisco Talos.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1263"
}
],
"trust": 0.6
},
"cve": "CVE-2020-13555",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-13555",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-11308",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-166345",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "talos-cna@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"id": "CVE-2020-13555",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"id": "CVE-2020-13555",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-13555",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "talos-cna@cisco.com",
"id": "CVE-2020-13555",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-13555",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-11308",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-1263",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-166345",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11308"
},
{
"db": "VULHUB",
"id": "VHN-166345"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1263"
},
{
"db": "NVD",
"id": "CVE-2020-13555"
},
{
"db": "NVD",
"id": "CVE-2020-13555"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-13555"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"db": "CNVD",
"id": "CNVD-2021-11308"
},
{
"db": "VULHUB",
"id": "VHN-166345"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "TALOS",
"id": "TALOS-2020-1169",
"trust": 3.1
},
{
"db": "NVD",
"id": "CVE-2020-13555",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016180",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-11308",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1263",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-166345",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11308"
},
{
"db": "VULHUB",
"id": "VHN-166345"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1263"
},
{
"db": "NVD",
"id": "CVE-2020-13555"
}
]
},
"id": "VAR-202102-0024",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11308"
},
{
"db": "VULHUB",
"id": "VHN-166345"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11308"
}
]
},
"last_update_date": "2024-11-23T22:40:46.685000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Advantech WebAccess/SCADA Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142130"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1263"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-276",
"trust": 1.1
},
{
"problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]",
"trust": 0.8
},
{
"problemtype": "CWE-269",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-166345"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"db": "NVD",
"id": "CVE-2020-13555"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13555"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11308"
},
{
"db": "VULHUB",
"id": "VHN-166345"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1263"
},
{
"db": "NVD",
"id": "CVE-2020-13555"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-11308"
},
{
"db": "VULHUB",
"id": "VHN-166345"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1263"
},
{
"db": "NVD",
"id": "CVE-2020-13555"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11308"
},
{
"date": "2021-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-166345"
},
{
"date": "2021-11-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"date": "2021-02-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1263"
},
{
"date": "2021-02-17T19:15:12.590000",
"db": "NVD",
"id": "CVE-2020-13555"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11308"
},
{
"date": "2022-06-29T00:00:00",
"db": "VULHUB",
"id": "VHN-166345"
},
{
"date": "2021-11-12T00:59:00",
"db": "JVNDB",
"id": "JVNDB-2020-016180"
},
{
"date": "2022-04-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1263"
},
{
"date": "2024-11-21T05:01:29.303000",
"db": "NVD",
"id": "CVE-2020-13555"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1263"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech\u00a0WebAccess/SCADA\u00a0 Vulnerability in privilege management",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016180"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1263"
}
],
"trust": 0.6
}
}
VAR-202102-0021
Vulnerability from variot - Updated: 2024-11-23 22:40An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via PostgreSQL executable, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202102-0021",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c9\u30d0\u30f3\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "9.0.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11304"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"db": "NVD",
"id": "CVE-2020-13551"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovered by Yuri Kramarz of Cisco Talos.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1261"
}
],
"trust": 0.6
},
"cve": "CVE-2020-13551",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-13551",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-11304",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-166341",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "talos-cna@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"id": "CVE-2020-13551",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.0,
"id": "CVE-2020-13551",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-13551",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "talos-cna@cisco.com",
"id": "CVE-2020-13551",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-13551",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-11304",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-1261",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-166341",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11304"
},
{
"db": "VULHUB",
"id": "VHN-166341"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1261"
},
{
"db": "NVD",
"id": "CVE-2020-13551"
},
{
"db": "NVD",
"id": "CVE-2020-13551"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via PostgreSQL executable, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-13551"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"db": "CNVD",
"id": "CNVD-2021-11304"
},
{
"db": "VULHUB",
"id": "VHN-166341"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "TALOS",
"id": "TALOS-2020-1169",
"trust": 3.1
},
{
"db": "NVD",
"id": "CVE-2020-13551",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016183",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-11304",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1261",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-166341",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11304"
},
{
"db": "VULHUB",
"id": "VHN-166341"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1261"
},
{
"db": "NVD",
"id": "CVE-2020-13551"
}
]
},
"id": "VAR-202102-0021",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11304"
},
{
"db": "VULHUB",
"id": "VHN-166341"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11304"
}
]
},
"last_update_date": "2024-11-23T22:40:46.656000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "https://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Advantech WebAccess/SCADA Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142128"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1261"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-276",
"trust": 1.1
},
{
"problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]",
"trust": 0.8
},
{
"problemtype": "CWE-269",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-166341"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"db": "NVD",
"id": "CVE-2020-13551"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2020-1169"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13551"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11304"
},
{
"db": "VULHUB",
"id": "VHN-166341"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1261"
},
{
"db": "NVD",
"id": "CVE-2020-13551"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-11304"
},
{
"db": "VULHUB",
"id": "VHN-166341"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-1261"
},
{
"db": "NVD",
"id": "CVE-2020-13551"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11304"
},
{
"date": "2021-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-166341"
},
{
"date": "2021-11-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"date": "2021-02-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1261"
},
{
"date": "2021-02-17T19:15:12.387000",
"db": "NVD",
"id": "CVE-2020-13551"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11304"
},
{
"date": "2022-06-29T00:00:00",
"db": "VULHUB",
"id": "VHN-166341"
},
{
"date": "2021-11-12T01:25:00",
"db": "JVNDB",
"id": "JVNDB-2020-016183"
},
{
"date": "2022-04-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-1261"
},
{
"date": "2024-11-21T05:01:28.800000",
"db": "NVD",
"id": "CVE-2020-13551"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1261"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech\u00a0WebAccess/SCADA\u00a0 Vulnerability in privilege management",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-016183"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-1261"
}
],
"trust": 0.6
}
}
VAR-202103-0910
Vulnerability from variot - Updated: 2024-11-23 22:40WebAccess/SCADA Versions 9.0 and prior is vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment.
Advantech WebAccess/SCADA 9.0 and earlier versions have cross-site scripting vulnerabilities
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202103-0910",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0"
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=9.0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"cve": "CVE-2021-27436",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2021-27436",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2021-27809",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-386703",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2021-27436",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-27436",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2021-27809",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202103-1019",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-386703",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2021-27436",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA Versions 9.0 and prior is vulnerable to cross-site scripting, which may allow an attacker to send malicious JavaScript code to an unsuspecting user, which could result in hijacking of the user\u2019s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser actions. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. \n\r\n\r\nAdvantech WebAccess/SCADA 9.0 and earlier versions have cross-site scripting vulnerabilities",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-27436"
},
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "ICS CERT",
"id": "ICSA-21-075-01",
"trust": 2.4
},
{
"db": "NVD",
"id": "CVE-2021-27436",
"trust": 2.4
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-27809",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0939",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-386703",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2021-27436",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"id": "VAR-202103-0910",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
}
]
},
"last_update_date": "2024-11-23T22:40:42.451000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Advantech WebAccess/SCADA cross-site scripting vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/257466"
},
{
"title": "Advantech Advantech WebAccess/SCADA Fixes for cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=145471"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-075-01"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0939"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-27436"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/79.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "VULHUB",
"id": "VHN-386703"
},
{
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
},
{
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-04-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"date": "2021-03-18T00:00:00",
"db": "VULHUB",
"id": "VHN-386703"
},
{
"date": "2021-03-18T00:00:00",
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"date": "2021-03-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202103-1019"
},
{
"date": "2021-03-18T22:15:13.617000",
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-04-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"date": "2021-03-25T00:00:00",
"db": "VULHUB",
"id": "VHN-386703"
},
{
"date": "2021-03-25T00:00:00",
"db": "VULMON",
"id": "CVE-2021-27436"
},
{
"date": "2021-03-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202103-1019"
},
{
"date": "2024-11-21T05:57:59.240000",
"db": "NVD",
"id": "CVE-2021-27436"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA cross-site scripting vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-27809"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202103-1019"
}
],
"trust": 0.6
}
}
VAR-201902-0122
Vulnerability from variot - Updated: 2024-11-23 22:37WebAccess/SCADA, Version 8.3. An improper authentication vulnerability exists that could allow a possible authentication bypass allowing an attacker to upload malicious data. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. An SQL-injection vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201902-0122",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.7,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "8.3"
}
],
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Devesh Logendran from Attila Cybertech Pte. Ltd.",
"sources": [
{
"db": "BID",
"id": "106722"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
],
"trust": 0.9
},
"cve": "CVE-2019-6519",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2019-6519",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32480",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157954",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6519",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-6519",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2019-6519",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2019-32480",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201901-888",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-157954",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA, Version 8.3. An improper authentication vulnerability exists that could allow a possible authentication bypass allowing an attacker to upload malicious data. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple authentication-bypass vulnerabilities\n2. An SQL-injection vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6519"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "VULHUB",
"id": "VHN-157954"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6519",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01",
"trust": 2.8
},
{
"db": "BID",
"id": "106722",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32480",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01T",
"trust": 0.6
},
{
"db": "IVD",
"id": "3889E774-ABCC-4EE1-BF6B-535A4FBA4CFF",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157954",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"id": "VAR-201902-0122",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
}
],
"trust": 1.5586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
}
]
},
"last_update_date": "2024-11-23T22:37:55.518000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess/SCADA Authorization Issue Vulnerability (CNVD-2019-32480)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/181479"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/106722"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6519"
},
{
"trust": 0.9,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6519"
},
{
"trust": 0.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01third party advisoryus government resource"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/106722third party advisoryvdb entry"
},
{
"trust": 0.3,
"url": "https://www.advantech.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"db": "VULHUB",
"id": "VHN-157954"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
},
{
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "3889e774-abcc-4ee1-bf6b-535a4fba4cff"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"date": "2019-02-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157954"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"date": "2019-01-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-888"
},
{
"date": "2019-02-05T21:29:00.737000",
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32480"
},
{
"date": "2019-02-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157954"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001596"
},
{
"date": "2019-04-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-888"
},
{
"date": "2024-11-21T04:46:36.913000",
"db": "NVD",
"id": "CVE-2019-6519"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA Authentication vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-001596"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-888"
}
],
"trust": 0.6
}
}
VAR-201902-0123
Vulnerability from variot - Updated: 2024-11-23 22:37WebAccess/SCADA, Version 8.3. Specially crafted requests could allow a possible authentication bypass that could allow an attacker to obtain and manipulate sensitive information. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. An SQL-injection vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201902-0123",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.7,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "8.3"
}
],
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Devesh Logendran from Attila Cybertech Pte. Ltd.",
"sources": [
{
"db": "BID",
"id": "106722"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
],
"trust": 0.9
},
"cve": "CVE-2019-6521",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2019-6521",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-32479",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157956",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6521",
"impactScore": 4.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-6521",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-6521",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2019-32479",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201901-889",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-157956",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA, Version 8.3. Specially crafted requests could allow a possible authentication bypass that could allow an attacker to obtain and manipulate sensitive information. WebAccess/SCADA Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple authentication-bypass vulnerabilities\n2. An SQL-injection vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6521"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "VULHUB",
"id": "VHN-157956"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6521",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01",
"trust": 2.8
},
{
"db": "BID",
"id": "106722",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-32479",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01T",
"trust": 0.6
},
{
"db": "IVD",
"id": "A390DD39-1C31-478B-BFF6-C1D917A3E87D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157956",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"id": "VAR-201902-0123",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
}
],
"trust": 1.5586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
}
]
},
"last_update_date": "2024-11-23T22:37:55.477000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess/SCADA Authorization Issue Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/181477"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/106722"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6521"
},
{
"trust": 0.9,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6521"
},
{
"trust": 0.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01third party advisoryus government resource"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/106722third party advisoryvdb entry"
},
{
"trust": 0.3,
"url": "https://www.advantech.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"db": "VULHUB",
"id": "VHN-157956"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
},
{
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"date": "2019-02-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157956"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"date": "2019-01-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-889"
},
{
"date": "2019-02-05T21:29:00.800000",
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-09-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-32479"
},
{
"date": "2019-02-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157956"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001597"
},
{
"date": "2019-04-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-889"
},
{
"date": "2024-11-21T04:46:37.157000",
"db": "NVD",
"id": "CVE-2019-6521"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Authorization Issue Vulnerability",
"sources": [
{
"db": "IVD",
"id": "a390dd39-1c31-478b-bff6-c1d917a3e87d"
},
{
"db": "CNVD",
"id": "CNVD-2019-32479"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-889"
}
],
"trust": 0.6
}
}
VAR-201902-0124
Vulnerability from variot - Updated: 2024-11-23 22:37WebAccess/SCADA, Version 8.3. The software does not properly sanitize its inputs for SQL commands. WebAccess/SCADA Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A SQL injection vulnerability exists in Advantech WebAccess/SCADA version 8.3. A remote attacker can exploit the vulnerability to execute SQL commands by sending a specially crafted request. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. An SQL-injection vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201902-0124",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 1.7,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess\\/scada",
"scope": "eq",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "8.3"
}
],
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Devesh Logendran from Attila Cybertech Pte. Ltd.",
"sources": [
{
"db": "BID",
"id": "106722"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
],
"trust": 0.9
},
"cve": "CVE-2019-6523",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2019-6523",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-03260",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "7d85de81-463f-11e9-a845-000c29342cb1",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157958",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6523",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-6523",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2019-6523",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2019-03260",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201901-890",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-157958",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2019-6523",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA, Version 8.3. The software does not properly sanitize its inputs for SQL commands. WebAccess/SCADA Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A SQL injection vulnerability exists in Advantech WebAccess/SCADA version 8.3. A remote attacker can exploit the vulnerability to execute SQL commands by sending a specially crafted request. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple authentication-bypass vulnerabilities\n2. An SQL-injection vulnerability\nAn attacker can exploit these issues to bypass certain security restrictions, perform unauthorized actions, modify the logic of SQL queries, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6523"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6523",
"trust": 3.7
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01",
"trust": 3.5
},
{
"db": "BID",
"id": "106722",
"trust": 2.1
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-03260",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-19-024-01T",
"trust": 0.6
},
{
"db": "IVD",
"id": "7D85DE81-463F-11E9-A845-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157958",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2019-6523",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"id": "VAR-201902-0124",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
}
],
"trust": 1.5586422
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
}
]
},
"last_update_date": "2024-11-23T22:37:55.435000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.advantech.com/"
},
{
"title": "Patch for Advantech WebAccess/SCADA SQL Injection Vulnerability (CNVD-2019-03260)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/151743"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-89",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/106722"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6523"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6523"
},
{
"trust": 0.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-024-01third party advisoryus government resource"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/106722third party advisoryvdb entry"
},
{
"trust": 0.3,
"url": "https://www.advantech.com/"
},
{
"trust": 0.3,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/89.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"db": "VULHUB",
"id": "VHN-157958"
},
{
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"db": "BID",
"id": "106722"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
},
{
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-01-30T00:00:00",
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"date": "2019-01-28T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"date": "2019-02-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157958"
},
{
"date": "2019-02-05T00:00:00",
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"date": "2019-01-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-890"
},
{
"date": "2019-02-05T21:29:00.863000",
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-01-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-03260"
},
{
"date": "2019-02-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157958"
},
{
"date": "2019-02-06T00:00:00",
"db": "VULMON",
"id": "CVE-2019-6523"
},
{
"date": "2019-01-24T00:00:00",
"db": "BID",
"id": "106722"
},
{
"date": "2019-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001598"
},
{
"date": "2019-04-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-890"
},
{
"date": "2024-11-21T04:46:37.410000",
"db": "NVD",
"id": "CVE-2019-6523"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebAccess/SCADA In SQL Injection vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-001598"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SQL injection",
"sources": [
{
"db": "IVD",
"id": "7d85de81-463f-11e9-a845-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-890"
}
],
"trust": 0.8
}
}
VAR-201801-1494
Vulnerability from variot - Updated: 2024-11-23 22:34A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. An attacker has read access to files within the directory structure of the target device. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the filename parameter of certUpdate.asp. The issue results from the lack of proper validation of user-supplied data, which can allow for the upload of arbitrary files. An attacker can leverage this vulnerability to execute code under the context of the current process. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA has a directory traversal vulnerability. Advantech WebAccess/SCADA is prone to a directory-traversal vulnerability and a SQL-injection vulnerability A remote attacker could exploit these issues to access data, or exploit latent vulnerabilities in the underlying database or use directory-traversal characters ('../') to access arbitrary files that contain sensitive information. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-1494",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "lt",
"trust": 1.0,
"vendor": "advantech",
"version": "8.2_20170817"
},
{
"model": "webaccess/scada",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "8.2_20170817"
},
{
"model": "webaccess node",
"scope": null,
"trust": 0.7,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess/scada \u003cv8.2 20170817",
"scope": null,
"trust": 0.6,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.0"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "7.2"
},
{
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-142"
}
],
"trust": 0.7
},
"cve": "CVE-2018-5445",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2018-5445",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2018-5445",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-01709",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-135476",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2018-5445",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-5445",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2018-5445",
"trust": 0.8,
"value": "Medium"
},
{
"author": "ZDI",
"id": "CVE-2018-5445",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-01709",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-958",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-135476",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. An attacker has read access to files within the directory structure of the target device. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the filename parameter of certUpdate.asp. The issue results from the lack of proper validation of user-supplied data, which can allow for the upload of arbitrary files. An attacker can leverage this vulnerability to execute code under the context of the current process. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA has a directory traversal vulnerability. Advantech WebAccess/SCADA is prone to a directory-traversal vulnerability and a SQL-injection vulnerability\nA remote attacker could exploit these issues to access data, or exploit latent vulnerabilities in the underlying database or use directory-traversal characters (\u0027../\u0027) to access arbitrary files that contain sensitive information. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-5445"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-135476"
}
],
"trust": 3.33
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-5445",
"trust": 4.3
},
{
"db": "ICS CERT",
"id": "ICSA-18-023-01",
"trust": 3.4
},
{
"db": "BID",
"id": "102781",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-01709",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5492",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-142",
"trust": 0.7
},
{
"db": "IVD",
"id": "E2E2B54F-39AB-11E9-B4D4-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-135476",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"id": "VAR-201801-1494",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
}
],
"trust": 1.6679344999999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
}
]
},
"last_update_date": "2024-11-23T22:34:24.928000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-023-01"
},
{
"title": "Advantech WebAccess/SCADA Directory Traversal Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/114215"
},
{
"title": "Advantech WebAccess/SCADA Repair measures for path traversal vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=78082"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-22",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/102781"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5445"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5445"
},
{
"trust": 0.6,
"url": "https://www.proxyit.cc/advisories/icsa-18-023-01"
},
{
"trust": 0.3,
"url": "http://www.advantech.in/"
},
{
"trust": 0.3,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"db": "VULHUB",
"id": "VHN-135476"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
},
{
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-01-24T00:00:00",
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"date": "2018-01-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"date": "2018-01-25T00:00:00",
"db": "VULHUB",
"id": "VHN-135476"
},
{
"date": "2018-01-23T00:00:00",
"db": "BID",
"id": "102781"
},
{
"date": "2018-02-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"date": "2018-01-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-958"
},
{
"date": "2018-01-25T03:29:00.367000",
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-02-09T00:00:00",
"db": "ZDI",
"id": "ZDI-18-142"
},
{
"date": "2018-01-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-01709"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-135476"
},
{
"date": "2018-01-23T00:00:00",
"db": "BID",
"id": "102781"
},
{
"date": "2018-02-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-958"
},
{
"date": "2024-11-21T04:08:49.057000",
"db": "NVD",
"id": "CVE-2018-5445"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Path traversal vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001575"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Path traversal",
"sources": [
{
"db": "IVD",
"id": "e2e2b54f-39ab-11e9-b4d4-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-958"
}
],
"trust": 0.8
}
}
VAR-201801-1493
Vulnerability from variot - Updated: 2024-11-23 22:34A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. WebAccess/SCADA does not properly sanitize its inputs for SQL commands. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the user parameter in chkLogin2.asp. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the database. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "webaccess node",
"scope": null,
"trust": 1.4,
"vendor": "advantech",
"version": null
},
{
"_id": null,
"model": "webaccess\\/scada",
"scope": "lt",
"trust": 1.0,
"vendor": "advantech",
"version": "8.2_20170817"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "lt",
"trust": 0.8,
"vendor": "advantech",
"version": "8.2_20170817"
},
{
"_id": null,
"model": "webaccess/scada \u003cv8.2 20170817",
"scope": null,
"trust": 0.6,
"vendor": "advantech",
"version": null
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.1"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.0"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "7.2"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess scada",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
}
],
"trust": 1.4
},
"cve": "CVE-2018-5443",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2018-5443",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 3.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-01710",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-135474",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2018-5443",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2018-5443",
"trust": 1.4,
"value": "MEDIUM"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2018-5443",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2018-5443",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2018-01710",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-959",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-135474",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "VULHUB",
"id": "VHN-135474"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
}
]
},
"description": {
"_id": null,
"data": "A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. WebAccess/SCADA does not properly sanitize its inputs for SQL commands. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the user parameter in chkLogin2.asp. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the database. Advantech WebAccess is a browser-based human interface HMI software package, as well as monitoring and data acquisition SCADA. Advantech WebAccess/SCADA is a browser-based SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-5443"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-135474"
}
],
"trust": 3.96
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-5443",
"trust": 5.0
},
{
"db": "ICS CERT",
"id": "ICSA-18-023-01",
"trust": 3.4
},
{
"db": "BID",
"id": "102781",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-01710",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5503",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-144",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5502",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-143",
"trust": 0.7
},
{
"db": "IVD",
"id": "E2E2B550-39AB-11E9-BB92-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-135474",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "VULHUB",
"id": "VHN-135474"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
}
]
},
"id": "VAR-201801-1493",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "VULHUB",
"id": "VHN-135474"
}
],
"trust": 1.6679344999999999
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
}
]
},
"last_update_date": "2024-11-23T22:34:24.880000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-023-01"
},
{
"title": "WebAccess/SCADA",
"trust": 0.8,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
},
{
"title": "Patch for Advantech WebAccess/SCADA SQL Injection Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/114217"
},
{
"title": "Advantech WebAccess/SCADA SQL Repair measures for injecting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=78083"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-89",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-135474"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 4.2,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/102781"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5443"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5443"
},
{
"trust": 0.6,
"url": "https://www.proxyit.cc/advisories/icsa-18-023-01"
},
{
"trust": 0.3,
"url": "http://www.advantech.in/"
},
{
"trust": 0.3,
"url": "http://www.advantech.com/industrial-automation/webaccess/webaccessscada"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-144"
},
{
"db": "ZDI",
"id": "ZDI-18-143"
},
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "VULHUB",
"id": "VHN-135474"
},
{
"db": "BID",
"id": "102781"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
},
{
"db": "NVD",
"id": "CVE-2018-5443"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-144",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-143",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2018-01710",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-135474",
"ident": null
},
{
"db": "BID",
"id": "102781",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001574",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-5443",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-01-24T00:00:00",
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1",
"ident": null
},
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-144",
"ident": null
},
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-143",
"ident": null
},
{
"date": "2018-01-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-01710",
"ident": null
},
{
"date": "2018-01-25T00:00:00",
"db": "VULHUB",
"id": "VHN-135474",
"ident": null
},
{
"date": "2018-01-23T00:00:00",
"db": "BID",
"id": "102781",
"ident": null
},
{
"date": "2018-02-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001574",
"ident": null
},
{
"date": "2018-01-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-959",
"ident": null
},
{
"date": "2018-01-25T03:29:00.320000",
"db": "NVD",
"id": "CVE-2018-5443",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-144",
"ident": null
},
{
"date": "2018-02-06T00:00:00",
"db": "ZDI",
"id": "ZDI-18-143",
"ident": null
},
{
"date": "2018-01-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-01710",
"ident": null
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-135474",
"ident": null
},
{
"date": "2018-01-23T00:00:00",
"db": "BID",
"id": "102781",
"ident": null
},
{
"date": "2018-02-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001574",
"ident": null
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-959",
"ident": null
},
{
"date": "2024-11-21T04:08:48.940000",
"db": "NVD",
"id": "CVE-2018-5443",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Advantech WebAccess/SCADA SQL Injection Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-01710"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
],
"trust": 1.2
},
"type": {
"_id": null,
"data": "SQL injection",
"sources": [
{
"db": "IVD",
"id": "e2e2b550-39ab-11e9-bb92-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-959"
}
],
"trust": 0.8
}
}
VAR-201906-0330
Vulnerability from variot - Updated: 2024-11-23 22:33Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 81024 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201906-0330",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "eq",
"trust": 1.8,
"vendor": "advantech",
"version": "8.4.0"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "8.4.0"
}
],
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
}
]
},
"cve": "CVE-2019-3954",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2019-3954",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-18839",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-155389",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-3954",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-3954",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2019-3954",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2019-18839",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201906-724",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-155389",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 81024 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3954"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "VULHUB",
"id": "VHN-155389"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-3954",
"trust": 3.3
},
{
"db": "TENABLE",
"id": "TRA-2019-28",
"trust": 3.1
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-18839",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594",
"trust": 0.8
},
{
"db": "IVD",
"id": "FD36FFFD-9D2A-4D51-AC7D-BAA7412A79AD",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-155389",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"id": "VAR-201906-0330",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
}
],
"trust": 1.4466745799999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
}
]
},
"last_update_date": "2024-11-23T22:33:57.134000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for AdvantechWebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-18839)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/164439"
},
{
"title": "Advantech WebAccess/SCADA Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93906"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-119",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://www.tenable.com/security/research/tra-2019-28"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3954"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3954"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"db": "VULHUB",
"id": "VHN-155389"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
},
{
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-21T00:00:00",
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"date": "2019-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"date": "2019-06-19T00:00:00",
"db": "VULHUB",
"id": "VHN-155389"
},
{
"date": "2019-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"date": "2019-06-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-724"
},
{
"date": "2019-06-19T00:15:13.360000",
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-18839"
},
{
"date": "2020-08-24T00:00:00",
"db": "VULHUB",
"id": "VHN-155389"
},
{
"date": "2019-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"date": "2020-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-724"
},
{
"date": "2024-11-21T04:42:56.187000",
"db": "NVD",
"id": "CVE-2019-3954"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005594"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "fd36fffd-9d2a-4d51-ac7d-baa7412a79ad"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-724"
}
],
"trust": 0.8
}
}
VAR-201906-0329
Vulnerability from variot - Updated: 2024-11-23 22:33Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 10012 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A stack-based buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201906-0329",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess",
"scope": "eq",
"trust": 1.8,
"vendor": "advantech",
"version": "8.4.0"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.6,
"vendor": "advantech",
"version": "8.4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "8.4.0"
}
],
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
}
]
},
"cve": "CVE-2019-3953",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2019-3953",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-18756",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-155388",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-3953",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-3953",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2019-3953",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2019-18756",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201906-719",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-155388",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 10012 RPC call. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AdvantechWebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A stack-based buffer overflow vulnerability exists in AdvantechWebAccess/SCADA version 8.4.0. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3953"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "VULHUB",
"id": "VHN-155388"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-3953",
"trust": 3.3
},
{
"db": "TENABLE",
"id": "TRA-2019-28",
"trust": 2.4
},
{
"db": "TENABLE",
"id": "TRA-2019-17",
"trust": 2.3
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-18756",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593",
"trust": 0.8
},
{
"db": "IVD",
"id": "FA262F58-BB0D-42B5-8FE7-AB4F4FA95260",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-155388",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"id": "VAR-201906-0329",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
}
],
"trust": 1.4466745799999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
}
]
},
"last_update_date": "2024-11-23T22:33:57.006000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for AdvantechWebAccess/SCADA Buffer Overflow Vulnerability (CNVD-2019-18756)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/164241"
},
{
"title": "Advantech WebAccess/SCADA Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93903"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-119",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://www.tenable.com/security/research/tra-2019-28"
},
{
"trust": 2.3,
"url": "https://www.tenable.com/security/research/tra-2019-17"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3953"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3953"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"db": "VULHUB",
"id": "VHN-155388"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
},
{
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-21T00:00:00",
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"date": "2019-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"date": "2019-06-18T00:00:00",
"db": "VULHUB",
"id": "VHN-155388"
},
{
"date": "2019-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"date": "2019-06-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-719"
},
{
"date": "2019-06-18T23:15:10.527000",
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-18756"
},
{
"date": "2020-08-24T00:00:00",
"db": "VULHUB",
"id": "VHN-155388"
},
{
"date": "2019-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"date": "2020-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-719"
},
{
"date": "2024-11-21T04:42:56.070000",
"db": "NVD",
"id": "CVE-2019-3953"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech WebAccess/SCADA Buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005593"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "fa262f58-bb0d-42b5-8fe7-ab4f4fa95260"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-719"
}
],
"trust": 0.8
}
}
VAR-202102-0294
Vulnerability from variot - Updated: 2024-11-23 22:25The WADashboard component of WebAccess/SCADA Versions 9.0 and prior may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the WADashboard component. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are security vulnerabilities in WebAccess/SCADA WADashboard version 9.0 and earlier versions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202102-0294",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webaccess\\/scada",
"scope": "lt",
"trust": 1.0,
"vendor": "advantech",
"version": "9.0.1"
},
{
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.8,
"vendor": "advantech",
"version": "version 9.0"
},
{
"model": "webaccess/scada",
"scope": null,
"trust": 0.7,
"vendor": "advantech",
"version": null
},
{
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=9.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess%2Fscada",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Sivathmican Sivakumaran",
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
}
],
"trust": 0.7
},
"cve": "CVE-2020-25161",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2020-25161",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2021-11309",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-179112",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-25161",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA score",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-009106",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-25161",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-25161",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2020-009106",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-25161",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-11309",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202010-700",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-179112",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The WADashboard component of WebAccess/SCADA Versions 9.0 and prior may allow an attacker to control or influence a path used in an operation on the filesystem and remotely execute code as an administrator. Advantech Provided by the company WebAccess/SCADA Is browser-based SCADA It is a software package. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the WADashboard component. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are security vulnerabilities in WebAccess/SCADA WADashboard version 9.0 and earlier versions",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-25161"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "VULMON",
"id": "CVE-2020-25161"
}
],
"trust": 2.97
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-25161",
"trust": 3.9
},
{
"db": "ICS CERT",
"id": "ICSA-20-289-01",
"trust": 3.1
},
{
"db": "JVN",
"id": "JVNVU97695305",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11262",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-1261",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-11309",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.3584",
"trust": 0.6
},
{
"db": "SEEBUG",
"id": "SSVID-98405",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-179112",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-25161",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"id": "VAR-202102-0294",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
}
],
"trust": 1.3586421999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-11309"
}
]
},
"last_update_date": "2024-11-23T22:25:21.556000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "WebAccess/SCADA Release Notes",
"trust": 0.8,
"url": "https://www.advantech.com/support/details/manual?id=1-1J6QG9J"
},
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-289-01"
},
{
"title": "Patch for Advantech WebAccess/SCADA path manipulation code execution vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/248501"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-610",
"trust": 1.1
},
{
"problemtype": "CWE-73",
"trust": 1.0
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.8,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-289-01"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-25161"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu97695305"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-25161"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.3584/"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189888"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"db": "VULHUB",
"id": "VHN-179112"
},
{
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
},
{
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-10-19T00:00:00",
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"date": "2021-02-23T00:00:00",
"db": "VULHUB",
"id": "VHN-179112"
},
{
"date": "2021-02-23T00:00:00",
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"date": "2020-10-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"date": "2020-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202010-700"
},
{
"date": "2021-02-23T17:15:13.270000",
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-10-19T00:00:00",
"db": "ZDI",
"id": "ZDI-20-1261"
},
{
"date": "2021-02-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-11309"
},
{
"date": "2021-02-27T00:00:00",
"db": "VULHUB",
"id": "VHN-179112"
},
{
"date": "2021-02-27T00:00:00",
"db": "VULMON",
"id": "CVE-2020-25161"
},
{
"date": "2020-10-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-009106"
},
{
"date": "2021-03-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202010-700"
},
{
"date": "2024-11-21T05:17:30.647000",
"db": "NVD",
"id": "CVE-2020-25161"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Advantech Made WebAccess/SCADA Filename and pathname external control vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-009106"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202010-700"
}
],
"trust": 0.6
}
}
VAR-201904-0182
Vulnerability from variot - Updated: 2024-11-23 22:17Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwrunmie.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities: 1. Multiple command-injection vulnerabilities 2. A denial-of-service vulnerability 3. Multiple stack-based buffer-overflow vulnerabilities An attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions. The vulnerability comes from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "webaccess",
"scope": null,
"trust": 1.4,
"vendor": "advantech",
"version": null
},
{
"_id": null,
"model": "webaccess",
"scope": "lte",
"trust": 1.0,
"vendor": "advantech",
"version": "8.3.5"
},
{
"_id": null,
"model": "webaccess",
"scope": "eq",
"trust": 0.8,
"vendor": "advantech",
"version": "8.3.5 and less"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "lte",
"trust": 0.6,
"vendor": "advantech",
"version": "\u003c=8.3.5"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.5"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.4"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3.2"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "eq",
"trust": 0.3,
"vendor": "advantech",
"version": "8.3"
},
{
"_id": null,
"model": "webaccess/scada",
"scope": "ne",
"trust": 0.3,
"vendor": "advantech",
"version": "8.4"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "webaccess",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:advantech:webaccess",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
}
]
},
"credits": {
"_id": null,
"data": "Mat Powell of Trend Micro Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
}
],
"trust": 1.4
},
"cve": "CVE-2019-6552",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2019-6552",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-08949",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-157987",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6552",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "NONE",
"vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6552",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-6552",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2019-6552",
"trust": 1.4,
"value": "CRITICAL"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2019-6552",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2019-6552",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2019-08949",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201904-091",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-157987",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2019-6552",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "VULMON",
"id": "CVE-2019-6552"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
}
]
},
"description": {
"_id": null,
"data": "Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwrunmie.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:\n1. Multiple command-injection vulnerabilities\n2. A denial-of-service vulnerability\n3. Multiple stack-based buffer-overflow vulnerabilities\nAn attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions. The vulnerability comes from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6552"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "VULMON",
"id": "CVE-2019-6552"
}
],
"trust": 4.05
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2019-6552",
"trust": 5.1
},
{
"db": "ICS CERT",
"id": "ICSA-19-092-01",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-19-326",
"trust": 1.3
},
{
"db": "BID",
"id": "107675",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-08949",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7928",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-7926",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-19-324",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.1113",
"trust": 0.6
},
{
"db": "IVD",
"id": "7965849B-AD7C-448A-ABFE-D9BB6EA63FFA",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-157987",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2019-6552",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "VULMON",
"id": "CVE-2019-6552"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
}
]
},
"id": "VAR-201904-0182",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "VULHUB",
"id": "VHN-157987"
}
],
"trust": 1.4466745799999998
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
}
]
},
"last_update_date": "2024-11-23T22:17:06.420000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Advantech has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01"
},
{
"title": "Advantech WebAccess",
"trust": 0.8,
"url": "https://www.advantech.co.jp/industrial-automation/webaccess"
},
{
"title": "Patch for Advantech WebAccess/SCADA Command Injection Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/157943"
},
{
"title": "Advantech WebAccess and Advantech WebAccess/SCADA Fixes for command injection vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91015"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-77",
"trust": 1.9
},
{
"problemtype": "CWE-78",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 5.0,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-092-01"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6552"
},
{
"trust": 1.3,
"url": "http://www.securityfocus.com/bid/107675"
},
{
"trust": 0.9,
"url": "https://www.advantech.com/"
},
{
"trust": 0.9,
"url": "https://support.advantech.com/support/downloadsrdetail_new.aspx?sr_id=1-ms9mjv\u0026doc_source=download"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6552"
},
{
"trust": 0.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-19-326/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/78318"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/78.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-19-326"
},
{
"db": "ZDI",
"id": "ZDI-19-324"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "VULHUB",
"id": "VHN-157987"
},
{
"db": "VULMON",
"id": "CVE-2019-6552"
},
{
"db": "BID",
"id": "107675"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
},
{
"db": "NVD",
"id": "CVE-2019-6552"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-326",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-19-324",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2019-08949",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-157987",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2019-6552",
"ident": null
},
{
"db": "BID",
"id": "107675",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201904-091",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2019-6552",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2019-04-03T00:00:00",
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-326",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-324",
"ident": null
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08949",
"ident": null
},
{
"date": "2019-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-157987",
"ident": null
},
{
"date": "2019-04-05T00:00:00",
"db": "VULMON",
"id": "CVE-2019-6552",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "BID",
"id": "107675",
"ident": null
},
{
"date": "2019-05-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003120",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-091",
"ident": null
},
{
"date": "2019-04-05T19:29:00.357000",
"db": "NVD",
"id": "CVE-2019-6552",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-326",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "ZDI",
"id": "ZDI-19-324",
"ident": null
},
{
"date": "2019-04-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-08949",
"ident": null
},
{
"date": "2020-10-06T00:00:00",
"db": "VULHUB",
"id": "VHN-157987",
"ident": null
},
{
"date": "2020-10-06T00:00:00",
"db": "VULMON",
"id": "CVE-2019-6552",
"ident": null
},
{
"date": "2019-04-02T00:00:00",
"db": "BID",
"id": "107675",
"ident": null
},
{
"date": "2019-05-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003120",
"ident": null
},
{
"date": "2020-10-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201904-091",
"ident": null
},
{
"date": "2024-11-21T04:46:40.877000",
"db": "NVD",
"id": "CVE-2019-6552",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Advantech WebAccess/SCADA Command injection vulnerability",
"sources": [
{
"db": "IVD",
"id": "7965849b-ad7c-448a-abfe-d9bb6ea63ffa"
},
{
"db": "CNVD",
"id": "CNVD-2019-08949"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003120"
}
],
"trust": 1.6
},
"type": {
"_id": null,
"data": "operating system commend injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201904-091"
}
],
"trust": 0.6
}
}
CVE-2025-67653 (GCVE-0-2025-67653)
Vulnerability from nvd – Published: 2025-12-18 20:38 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-67653",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:01:07.058903Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:25.952Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\u0026nbsp;is vulnerable to directory traversal, which may allow an attacker to determine the existence of arbitrary files."
}
],
"value": "Advantech WebAccess/SCADA\u00a0is vulnerable to directory traversal, which may allow an attacker to determine the existence of arbitrary files."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:38:12.958Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA Path Traversal",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-67653",
"datePublished": "2025-12-18T20:38:12.958Z",
"dateReserved": "2025-12-09T20:16:53.210Z",
"dateUpdated": "2025-12-18T21:46:25.952Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-46268 (GCVE-0-2025-46268)
Vulnerability from nvd – Published: 2025-12-18 20:35 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-46268",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:01:36.611654Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:32.063Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\u0026nbsp;\nis vulnerable to SQL injection, which may allow an attacker to execute arbitrary SQL commands."
}
],
"value": "Advantech WebAccess/SCADA\u00a0\nis vulnerable to SQL injection, which may allow an attacker to execute arbitrary SQL commands."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:36:44.775Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA SQL Injection",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-46268",
"datePublished": "2025-12-18T20:35:36.866Z",
"dateReserved": "2025-07-30T19:03:10.153Z",
"dateUpdated": "2025-12-18T21:46:32.063Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-14850 (GCVE-0-2025-14850)
Vulnerability from nvd – Published: 2025-12-18 20:30 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14850",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:03:11.658719Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:52.446Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\u0026nbsp;is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files."
}
],
"value": "Advantech WebAccess/SCADA\u00a0is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:30:56.575Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA Improper Limitation of a Pathname to a Restricted Directory",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-14850",
"datePublished": "2025-12-18T20:30:56.575Z",
"dateReserved": "2025-12-17T18:59:18.176Z",
"dateUpdated": "2025-12-18T21:46:52.446Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-14849 (GCVE-0-2025-14849)
Vulnerability from nvd – Published: 2025-12-18 20:32 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14849",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:02:39.843427Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:46.491Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\u0026nbsp;\nis vulnerable to unrestricted file upload, which may allow an attacker to remotely execute arbitrary code."
}
],
"value": "Advantech WebAccess/SCADA\u00a0\nis vulnerable to unrestricted file upload, which may allow an attacker to remotely execute arbitrary code."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:32:38.746Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA Unrestricted Upload of File with Dangerous Type",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-14849",
"datePublished": "2025-12-18T20:32:38.746Z",
"dateReserved": "2025-12-17T18:58:28.259Z",
"dateUpdated": "2025-12-18T21:46:46.491Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-14848 (GCVE-0-2025-14848)
Vulnerability from nvd – Published: 2025-12-18 20:34 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14848",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:01:58.179423Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:40.178Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\nis vulnerable to absolute directory traversal, which may allow an attacker to determine the existence of arbitrary files."
}
],
"value": "Advantech WebAccess/SCADA\nis vulnerable to absolute directory traversal, which may allow an attacker to determine the existence of arbitrary files."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-36",
"description": "CWE-36",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:34:03.497Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA Absolute Path Traversal",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-14848",
"datePublished": "2025-12-18T20:34:03.497Z",
"dateReserved": "2025-12-17T18:57:55.208Z",
"dateUpdated": "2025-12-18T21:46:40.178Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-67653 (GCVE-0-2025-67653)
Vulnerability from cvelistv5 – Published: 2025-12-18 20:38 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-67653",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:01:07.058903Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:25.952Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\u0026nbsp;is vulnerable to directory traversal, which may allow an attacker to determine the existence of arbitrary files."
}
],
"value": "Advantech WebAccess/SCADA\u00a0is vulnerable to directory traversal, which may allow an attacker to determine the existence of arbitrary files."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:38:12.958Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA Path Traversal",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-67653",
"datePublished": "2025-12-18T20:38:12.958Z",
"dateReserved": "2025-12-09T20:16:53.210Z",
"dateUpdated": "2025-12-18T21:46:25.952Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-46268 (GCVE-0-2025-46268)
Vulnerability from cvelistv5 – Published: 2025-12-18 20:35 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-46268",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:01:36.611654Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:32.063Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\u0026nbsp;\nis vulnerable to SQL injection, which may allow an attacker to execute arbitrary SQL commands."
}
],
"value": "Advantech WebAccess/SCADA\u00a0\nis vulnerable to SQL injection, which may allow an attacker to execute arbitrary SQL commands."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:36:44.775Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA SQL Injection",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-46268",
"datePublished": "2025-12-18T20:35:36.866Z",
"dateReserved": "2025-07-30T19:03:10.153Z",
"dateUpdated": "2025-12-18T21:46:32.063Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-14848 (GCVE-0-2025-14848)
Vulnerability from cvelistv5 – Published: 2025-12-18 20:34 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14848",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:01:58.179423Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:40.178Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\nis vulnerable to absolute directory traversal, which may allow an attacker to determine the existence of arbitrary files."
}
],
"value": "Advantech WebAccess/SCADA\nis vulnerable to absolute directory traversal, which may allow an attacker to determine the existence of arbitrary files."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-36",
"description": "CWE-36",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:34:03.497Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA Absolute Path Traversal",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-14848",
"datePublished": "2025-12-18T20:34:03.497Z",
"dateReserved": "2025-12-17T18:57:55.208Z",
"dateUpdated": "2025-12-18T21:46:40.178Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-14849 (GCVE-0-2025-14849)
Vulnerability from cvelistv5 – Published: 2025-12-18 20:32 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14849",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:02:39.843427Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:46.491Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\u0026nbsp;\nis vulnerable to unrestricted file upload, which may allow an attacker to remotely execute arbitrary code."
}
],
"value": "Advantech WebAccess/SCADA\u00a0\nis vulnerable to unrestricted file upload, which may allow an attacker to remotely execute arbitrary code."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:32:38.746Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA Unrestricted Upload of File with Dangerous Type",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-14849",
"datePublished": "2025-12-18T20:32:38.746Z",
"dateReserved": "2025-12-17T18:58:28.259Z",
"dateUpdated": "2025-12-18T21:46:46.491Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-14850 (GCVE-0-2025-14850)
Vulnerability from cvelistv5 – Published: 2025-12-18 20:30 – Updated: 2025-12-18 21:46| Vendor | Product | Version | ||
|---|---|---|---|---|
| Advantech | WebAccess/SCADA |
Affected:
9.2.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-14850",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T21:03:11.658719Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T21:46:52.446Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "WebAccess/SCADA",
"vendor": "Advantech",
"versions": [
{
"status": "affected",
"version": "9.2.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alex Wiliams from Pellera Technologies reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech WebAccess/SCADA\u0026nbsp;is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files."
}
],
"value": "Advantech WebAccess/SCADA\u00a0is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T20:30:56.575Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-06"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-06.json"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Advantech recommends users apply the following mitigations and update to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.advantech.com/en-us/support/details/installation?id=1-MS9MJV\"\u003eWebAccess/SCADA: Version 9.2.2\u003c/a\u003e.\n\n\u003cbr\u003e"
}
],
"value": "Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation ."
}
],
"source": {
"advisory": "ICSA-25-352-06",
"discovery": "EXTERNAL"
},
"title": "Advantech WebAccess/SCADA Improper Limitation of a Pathname to a Restricted Directory",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2025-14850",
"datePublished": "2025-12-18T20:30:56.575Z",
"dateReserved": "2025-12-17T18:59:18.176Z",
"dateUpdated": "2025-12-18T21:46:52.446Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}