7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.003 Low
EPSS
Percentile
66.3%
The Advantech WebAccess web server running on the remote host is affected by a SQL injection (SQLi) vulnerability in the WaExlViewer web application due to a failure to properly sanitize user-supplied input to the updateTemplate.aspx page. An authenticated, remote attacker can exploit this, via a series of crafted HTTP requests, to disclose passwords of administrative accounts used by Advantech WebAccess. Note that an attacker can also exploit this vulnerability without authentication by leveraging an existing authentication bypass vulnerability (CVE-2017-5152).
Nessus has exploited the authentication bypass vulnerability (CVE-2017-5152) in order to exploit the SQLi vulnerability (CVE-2017-5154).
Binary data scada_advantech_webaccess_cve-2017-5154.nbin
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.003 Low
EPSS
Percentile
66.3%