CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
95.8%
OVERVIEW
This advisory follows up on two previous ICS-CERT Alerts:
ICS-CERT received both coordinated and uncoordinated reports of eighteen vulnerabilities in BroadWin WebAccess. These vulnerabilities include:
These vulnerabilities were reported separately by the nSense Vulnerability Coordination Team, Greg MacManus of iSIGHT Partners, Kuang-Chun Hung of Security Research and Service Institute-Information and Communication Security Technology Center (ICST), Luigi Auriemma, Billy Rios, Terry McCorkle, and Snake (alias).
ICS-CERT has coordinated with Advantech, which has released a new version of WebAccess that addresses most of the reported vulnerabilities.
These vulnerabilities affect all versions of Advantech/BroadWin WebAccess prior to applying the patch (V7.0) listed in the mitigations below.
An attacker can bypass authentication, gain administrative privileges, and remotely execute arbitrary code by exploiting these vulnerabilities.
Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their environment, architecture, and product implementation.
Advantech/BroadWin WebAccess is a web-based human-machine interface product used in energy, manufacturing, and building automation systems. The installation base is across Asia, North America, North Africa, and the Middle East.
WebAccess Client is available for computers running Windows 2000, XP, Vista, and Server 2003. A thin‑client interface is available for Windows CE and Windows Mobile 5.0.
VULNERABILITY CHARACTERIZATION
An attacker may use a malformed URL address in a XSS attack to launch JavaScript code.
CVE-2012-0233http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0233, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
An attacker can use a malformed URL address to execute an SQL injection attack.
CVE-2012-0234http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0234, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
The web application does not sufficiently verify whether a request was intentionally provided by the user who submitted the request.
CVE-2012-0235http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0235, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
An unauthenticated user can access restricted information using specific URL addresses.
CVE-2012-0236http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0236, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
This vulnerability can be exploited by using specifically crafted URL addresses, which allows an unauthenticated user to enable or disable date and time syncing.
CVE-2012-0237http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0237, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory has been assigned to this vulnerability.
A stack-based buffer overflow vulnerability exists in opcImg.asp that, when exploited, allows an attacker to remotely execute arbitrary code.
CVE-2012-0238http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0238, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
An authentication vulnerability exists in uaddUpAdmin.asp in Advantech’s WebAccess 7.0—and possibly earlier versions—that, when exploited, allows an attacker to remotely change an administrator’s password. Exploit code is not required to exploit this vulnerability.
CVE-2012-0239http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0239, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
An authentication vulnerability exists in GbScriptAddUp.asp that, when exploited, allows an attacker to remotely execute arbitrary code.
CVE-2012-0240http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0240, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
A long string input to ActiveX parameters will cause a buffer overflow, which might allow remote attackers to execute arbitrary code and gain full control of the server.
CVE-2011-4526http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4526, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
This vulnerability exists because long string input to parameters will cause a buffer overflow, which could allow execution of arbitrary code.
CVE-2011-4524http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4524, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
An attacker can load any remote web page and write to a local batch file that will allow arbitrary code execution.
CVE-2011-4525http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4525, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
This vulnerability exists because string inputs are not checked, allowing attackers to perform SQL injection attacks.
CVE-2011-4521http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4521, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
This vulnerability exists because malicious cross-site scripts are allowed by parameters of bwerrdn.asp.
CVE-2011-4522http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4522, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
This vulnerability exists because malicious cross-site scripts are allowed by parameters of bwview.asp.
CVE-2011-4523http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4523, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
This vulnerability exists because functions are allowed to corrupt arbitrary memory zones through fully controllable stream identifiers.
CVE-2012-0241http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0241, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
A format string vulnerability can be exploited by the using a message string without the required format arguments.
CVE-2012-0242http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0242, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
A component used by WebAccess, bwocxrun.ocx, is vulnerable to a buffer overflow vulnerability due to methods that are capable of creating a arbitrary file in arbitrary location. Exploitation could allow the execution of arbitrary code.
CVE-2012-0243http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0243, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
This vulnerability exists because string inputs are not checked on input, allowing attackers to perform many different SQL injection attacks.
CVE-2012-0244http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0244, NIST uses this advisory to create the CVE website report. This website will be active sometime after publication of this advisory. has been assigned to this vulnerability.
All the vulnerabilities contained in this report are remotely exploitable.
Public exploits are known to target these vulnerabilities.
An attacker with low to moderate skill can exploit these vulnerabilities.
MITIGATION
Advantech has created a new version of WebAccess (7.0) that addresses these vulnerabilities.Advantech WebAccess security update, http://webaccess.advantech.com/security.php, website last accessed February 15, 2012. This new version can be obtained at: <http://webaccess.advantech.com/downloads.php>. Advantech recommends that the new version be installed over the existing installation. If the existing version of WebAccess is uninstalled, the computer must be rebooted before reinstalling WebAccess.
Advantech recommends that customers using the WebAccess product refer to security considerations recommended by their installation manual.WebAccess Quick Installation Guide, BroadWin, http://broadwin.com/Manual/InstallGuide/InstallGuide.htm , website last accessed February 15, 2012.
For further assistance, customers should contact BroadWin support at [email protected].WebAccess customer notification, http://www.advantechdirect.com/eMarketingPrograms/WebAccess_Patch/WebAccess_Vulnerability.htm , website last accessed February 15, 2012.
ICST, iSIGHT, and ICS-CERT have validated that the new version mitigates Vulnerabilities 1 and 5-16. For Vulnerabilities 2 and 3, the patched version fixes the issue for unauthenticated users; however, the problem still remains for nonadmin project users. Vulnerability 4 was not patched, because Advantech does not consider it to be a security risk. Neither ICS-CERT nor independent researchers have validated that the new version resolves Vulnerabilities 17 and 18.
ICS‑CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.
The Control Systems Security Program (CSSP) also provides a section for control systems security recommended practices on the ICS-CERT web site. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. ICS‑CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS‑CERT for tracking and correlation against other incidents.
In addition, ICS‑CERT recommends that users take the following measures to protect themselves from social engineering attacks:
webaccess.advantech.com/downloads.php
cisasurvey.gov1.qualtrics.com/jfe/form/SV_9n4TtB8uttUPaM6?product=https://www.cisa.gov/news-events/ics-advisories/icsa-12-047-01a
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=%20Advantech%20WebAccess%20Vulnerabilities%20%28UPDATE%20A%29+https://www.cisa.gov/news-events/ics-advisories/icsa-12-047-01a
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-12-047-01a&title=%20Advantech%20WebAccess%20Vulnerabilities%20%28UPDATE%20A%29
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-12-047-01a
www.oig.dhs.gov/
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=%20Advantech%20WebAccess%20Vulnerabilities%20%28UPDATE%20A%29&body=www.cisa.gov/news-events/ics-advisories/icsa-12-047-01a