SB2019091039 - Remote code execution in Advantech WebAccess/SCADA



SB2019091039 - Remote code execution in Advantech WebAccess/SCADA

Published: September 10, 2019 Updated: September 19, 2019

Security Bulletin ID SB2019091039
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Stack-based buffer overflow (CVE-ID: CVE-2019-3975)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists in the "GetUserPasswd" function in "BwPAlarm.dll" due to a boundary error when processing an IOCTL 70603 RPC message. A remote unauthenticated attacker can send a specially crafted IOCTL 70603 RPC message to the application, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.