Lucene search

K
ptsecurityPositive TechnologiesPT-2016-05
HistoryDec 15, 2014 - 12:00 a.m.

PT-2016-05: Arbitrary Code Execution in Advantech WebAccess

2014-12-1500:00:00
Positive Technologies
www.ptsecurity.com
7

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.3%

PT-2016-05: Arbitrary Code Execution in Advantech WebAccess

Vulnerable software

Advantech WebAccess
Version: 8.0 and earlier

Links:
http://www.advantech.com/products/webaccess-solutions/

Severity level

Severity level: High
Impact: Arbitrary Code Execution
Access Vector: Remote

CVSS v2:
Base Score: 6.8
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVE: CVE-2015-6467

Software description

Advantech WebAccess is a browser-based software package for human-machine interfaces HMI, and supervisory control and data acquisition SCADA. It is used to automate complex industrial processes for situations where remote operations are needed.

Vulnerability description

The specialists of the Positive Research center have detected an Arbitrary Code Execution vulnerability in Advantech WebAccess.

A browser plug-in for Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code.

How to fix

Update your software up to the latest version

Advisory status

15.12.2014 - Vendor gets vulnerability details
14.01.2016 - Vendor releases fixed version and details
10.03.2016 - Public disclosure

Credits

The vulnerability was detected by Alexey Osipov and Mikhail Firstov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2016-05
https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com
<http://en.securitylab.ru/lab/&gt;

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.3%