9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.008 Low
EPSS
Percentile
81.9%
Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.
CPE | Name | Operator | Version |
---|---|---|---|
advantech:iview | advantech iview | le | 5.6 |
us-cert.cisa.gov/ics/advisories/icsa-20-196-01
www.zerodayinitiative.com/advisories/ZDI-20-827/
www.zerodayinitiative.com/advisories/ZDI-20-828/
www.zerodayinitiative.com/advisories/ZDI-20-830/
www.zerodayinitiative.com/advisories/ZDI-20-832/
www.zerodayinitiative.com/advisories/ZDI-20-833/
www.zerodayinitiative.com/advisories/ZDI-20-835/
www.zerodayinitiative.com/advisories/ZDI-20-836/
www.zerodayinitiative.com/advisories/ZDI-20-837/
www.zerodayinitiative.com/advisories/ZDI-20-838/
www.zerodayinitiative.com/advisories/ZDI-20-839/
www.zerodayinitiative.com/advisories/ZDI-20-842/
www.zerodayinitiative.com/advisories/ZDI-20-843/
www.zerodayinitiative.com/advisories/ZDI-20-844/
www.zerodayinitiative.com/advisories/ZDI-20-845/
www.zerodayinitiative.com/advisories/ZDI-20-846/
www.zerodayinitiative.com/advisories/ZDI-20-847/
www.zerodayinitiative.com/advisories/ZDI-20-848/
www.zerodayinitiative.com/advisories/ZDI-20-849/
www.zerodayinitiative.com/advisories/ZDI-20-850/
www.zerodayinitiative.com/advisories/ZDI-20-851/
www.zerodayinitiative.com/advisories/ZDI-20-852/
www.zerodayinitiative.com/advisories/ZDI-20-853/
www.zerodayinitiative.com/advisories/ZDI-20-854/
www.zerodayinitiative.com/advisories/ZDI-20-855/
www.zerodayinitiative.com/advisories/ZDI-20-856/
www.zerodayinitiative.com/advisories/ZDI-20-857/
www.zerodayinitiative.com/advisories/ZDI-20-858/
www.zerodayinitiative.com/advisories/ZDI-20-860/
www.zerodayinitiative.com/advisories/ZDI-20-861/
www.zerodayinitiative.com/advisories/ZDI-20-862/
www.zerodayinitiative.com/advisories/ZDI-20-863/
www.zerodayinitiative.com/advisories/ZDI-20-864/
www.zerodayinitiative.com/advisories/ZDI-20-865/
www.zerodayinitiative.com/advisories/ZDI-20-866/
www.zerodayinitiative.com/advisories/ZDI-20-868/
www.zerodayinitiative.com/advisories/ZDI-20-869/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.008 Low
EPSS
Percentile
81.9%