Remote code execution in Advantech WebAccess

Published: 2017-11-03 12:14:43
Severity High
Patch available YES
Number of vulnerabilities 2
CVSSv2 6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5 (AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
CVSSv3 8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE ID CVE-2017-14016
CVE-2017-12719
CWE ID CWE-121
CWE-822
Exploitation vector Network
Public exploit Not available
Vulnerable software Advantech WebAccess
Vulnerable software versions Advantech WebAccess 8.1
Advantech WebAccess 8.0_20150816
Advantech WebAccess 8.0_20150412
Show more
Vendor URL Advantech Co., Ltd
Advisory type Public

Security Advisory

1) Stack-based buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper validation of the length of user-supplied data. A remote attacker can trick the victim into loading a specially crafted input, trigger stack-based buffer overflow and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Install update from vendor's website.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-17-306-02

2) Untrusted pointer dereference

Description

The vulnerability allows a remote attacker to possibly execute arbitrary code on the target system.

The weakness exists due to untrusted pointer dereference. A remote attacker can supply a specially crafted program, cause the application to become unavailable and possibly execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Install update from vendor's website.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-17-306-02

Back to List