Advantech continues having vulnerability issues as there is a buffer overflow vulnerability that affects multiple Advantech OPC (OLE for Process Control) Server products. The vulnerability may allow remote code execution and elevated user privileges.
Advantech created a new software version that mitigates this vulnerability, discovered by Security research and service institute Information and Communication Security Technology Center (ICST). ICST tested the new version and confirmed it fully resolves this vulnerability.
The following versions of OPC Server suffer from the vulnerability: Advantech ADAM OPC Server Versions prior to V3.01.012; Advantech Modbus RTU OPC Server Versions prior to V3.01.010, and Advantech Modbus TCP OPC Server Versions prior to V3.01.010.
The buffer overflow in the Advantech ADAM OPC Server ActiveX control could allow remote attackers to execute arbitrary code and gain/elevate privileges to the currently logged in user. An attacker with a low skill level can create a denial of service; however, a more skilled attacker could execute arbitrary code.
Advantech is a Taiwanese-based company that manufactures and sells industrial personal computers (PCs), embedded computers, automation controllers, and software to customers in the energy, telecommunications, and transportation industries.
OPC Server is an interface for industrial device servers, Advantech officials said. The Advantech ADAM OPC server allows Input/Output (I/O) devices to communicate with a wide range of human-machine interface (HMI)/supervisory control and data acquisition (SCADA) software packages. Any software system with OPC client capabilities can access the Advantech OPC server drivers. The Advantech ADAM OPC Server is primarily in East Asia with a few installations in North America.
The buffer overflow in the Advantech ADAM OPC Server ActiveX control might allow remote attackers to execute arbitrary code and gain privileges as the currently logged in user.
CVE-2011-1914 is the number assigned to this vulnerability.
Advantech created a patch to mitigate this vulnerability. ICST tested the patch to verify it eliminates the vulnerability. Click here to download the patches for the three products.