#VU15542 Improper access control in Advantech WebAccess


Published: 2018-10-26

Vulnerability identifier: #VU15542

Vulnerability risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-17908

CWE-ID: CWE-284

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Advantech WebAccess
Server applications / SCADA systems

Vendor: Advantech Co., Ltd

Description
The vulnerability allows a local unauthenticated attacker to gain elevated privileges on the target system.

The vulnerability exists due to the application installer disables user access control and does not re-enable it after the installation is complete. A local unauthenticated attacker can run elevated arbitrary code.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Update to version 8.3.3.

Vulnerable software versions

Advantech WebAccess: 8.3 - 8.3.2


External links
http://ics-cert.us-cert.gov/advisories/ICSA-18-298-02


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability