SB2021021705 - Multiple vulnerabilities in Advantech WebAccess/SCADA
Published: February 17, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Incorrect default permissions (CVE-ID: CVE-2020-13551)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions within the "PostgreSQL" executable. A local user with access to the system can view contents of files and directories or modify them.
2) Incorrect default permissions (CVE-ID: CVE-2020-13552)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions within the "WebAccessMongoDB", "SaaS-Composer_keep-alive", "Dashboard", "WISE-PaaS_SaaS-Composer" and "InfluxDB" executables. A local user with access to the system can view contents of files and directories or modify them.
3) Incorrect default permissions (CVE-ID: CVE-2020-13553)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions within the Node.js script source. A local user with access to the system can view contents of files and directories or modify them.
4) Incorrect default permissions (CVE-ID: CVE-2020-13554)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions within the webvrpcs Run Key. A local user with access to the system can view contents of files and directories or modify them.
5) Incorrect default permissions (CVE-ID: CVE-2020-13555)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions within the COM Server Application. A local user with access to the system can view contents of files and directories or modify them.
6) Path traversal (CVE-ID: CVE-2020-13550)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within the installation functionality. A remote authenticated attacker can send a specially crafted HTTP request and read arbitrary files on the system.
Remediation
Install update from vendor's website.