Your one-stop web resource providing safety and security information to manufacturers

Advantech has a new version to address multiple vulnerabilities in its WebAccess/SCADA, according to a report with NCCIC.

The vulnerabilities are a path traversal, stack-based buffer overflow, heap-based buffer overflow, out-of-bounds read, out-of-bounds write, and an untrusted pointer dereference.

RELATED STORIES
SICK Handles MSC800 Issue
ABB Clears CP635 HMI Vulnerability
ABB Fixes CP651 HMI Hole
ABB Clears Panel Builder 600 Holes

Successful exploitation of these remotely exploitable vulnerabilities, discovered by Mat Powell, Natnael Samson (@NattiSamson) and EljahLG, working with Trend Micro’s Zero Day Initiative (ZDI), may allow information disclosure, deletion of files, and remote code execution.

A SCADA software platform, WebAccess/SCADA Versions 8.3.5 and prior suffer from the issues.

Cyber Security

In one issue, a path traversal vulnerability is caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage this vulnerability to delete files while posing as an administrator.

CVE-2019-10985 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.

In addition, multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution.

CVE-2019-10991 is the case number assigned to these vulnerabilities, which has a CVSS v3 base score of 9.8.

Also, multiple heap-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution.

CVE-2019-10989 is the case number assigned to these vulnerabilities, which has a CVSS v3 base score of 9.8.

In another issues, an out-of-bounds read vulnerability is caused by a lack of proper validation of user-supplied data. Exploitation of this vulnerability may allow disclosure of information.

CVE-2019-10983 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 5.3.

In addition, multiple out-of-bounds write vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution.

CVE-2019-10987 is the case number assigned to these vulnerabilities, which has a CVSS v3 base score of 8.8.

Also, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code.

CVE-2019-10993 is the case number assigned to these vulnerabilities., which has a CVSS v3 base score of 9.8.

The product sees use mainly in the critical manufacturing, energy, water and wastewater systems sectors. The product sees action mainly in East Asia, United States, and Europe.

No known public exploits specifically target these vulnerabilities. However, an attacker with low skill level could leverage the vulnerabilities.

Taiwan-based Advantech has released Version 8.4.1 of WebAccess/SCADA to address the reported vulnerabilities. Users can click here to download the latest version of WebAccess/SCADA (registeration is required).

Pin It on Pinterest

Share This