8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
46.5%
Successful exploitation of these vulnerabilities could allow authenticated users to perform a local privilege escalation and retrieve any information from the productβs database.
The following versions of R-SeeNet, a monitoring application, are affected:
Advantech is aware of multiple SQL injection vulnerabilities in the following pages: group_list, company_list, user_list, and device_list. An attacker could send a specially crafted HTTP request to trigger the vulnerabilities.
CVE-2021-21915, CVE-2021-21916, CVE-2021-21917, CVE-2021-21918, CVE-2021-21919, CVE-2021-21920, CVE-2021-21921, CVE-2021-21922, CVE-2021-21923, CVE-2021-21924, CVE-2021-21925, CVE-2021-21926, CVE-2021-21927, CVE-2021-21928, CVE-2021-21929, CVE-2021-21930, CVE-2021-21931, CVE-2021-21932, CVE-2021-21933, CVE-2021-21934, CVE-2021-21935, CVE-2021-21936, and CVE-2021-21937 have been assigned to these vulnerabilities. A CVSS v3 base score of 7.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
Advantech is aware of multiple privilege escalation vulnerabilities that could be triggered when an authenticated user replaces a specially crafted file in the system to escalate privileges to NT SYSTEM authority.
CVE-2021-21910, CVE-2021-21911, and CVE-2021-21912 have been assigned to these vulnerabilities. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
Yuri Kramarz of Cisco Talos reported these vulnerabilities to CISA.
Advantech recommends updating to Version 2.4.17 or later.
See Advantech Czechβs Security Advisory SA-2021-03 for more information.
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01BβTargeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
No known public exploits specifically target these vulnerabilities.
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21910
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21911
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21912
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21915
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21916
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21917
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21918
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21919
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21920
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21921
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21922
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21923
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21924
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21925
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21926
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21927
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21928
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21929
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21930
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21931
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21932
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21933
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21934
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21935
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21936
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21937
cwe.mitre.org/data/definitions/269.html
cwe.mitre.org/data/definitions/89.html
icr.advantech.cz/products/software/r-seenet
icr.advantech.cz/support/router-models/download/511/sa-2021-03-r-seenet-vulnerabilities.pdf
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=Advantech%20R-SeeNet+https://www.cisa.gov/news-events/ics-advisories/icsa-21-348-01
www.cisa.gov/uscert/ics
www.cisa.gov/uscert/ics
www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01
www.cisa.gov/uscert/ics/recommended-practices
www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B
www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-21-348-01&title=Advantech%20R-SeeNet
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-21-348-01
www.oig.dhs.gov/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/ics-advisories/icsa-21-348-01
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=Advantech%20R-SeeNet&body=www.cisa.gov/news-events/ics-advisories/icsa-21-348-01
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
46.5%