Advantech WebAccess - Multiple Vulnerabilities

Number: AV16-009
Date: January 18 2016

Purpose

The purpose of this advisory is to bring attention to multiple vulnerabilities in Advantech's WebAccess application.

Assessment

Advantech's WebAccess is a web based application used with SCADA and human machine interfaces (HMI). CCIRC is aware of 15 disclosed vulnerabilities in Advantech WebAccess application. The exploitation of these vulnerabilities could allow an attacker to upload, create, or delete random files on a target system, deny access to valid users or remotely execute arbitrary code. Affected Versions: WebAccess Version 8 and prior versions.

Vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. Overview and Associated CVEs:

  1. Access of Memory Location After End of Buffer: CVE-2016-0851
  2. Improper Access Control: CVE-2016-0852
  3. Unrestricted Upload of File With Dangerous Type: CVE-2016-0854
  4. Path Traversal: CVE-2016-0855
  5. Stack-Based Buffer Overflow: CVE-2016-0856
  6. Heap-Based Buffer Overflow: CVE-2016-0857
  7. Race Condition: CVE-2016-0858
  8. Integer Overflow to Buffer Overflow: CVE-2016-0859
  9. Improper Restriction of Operations Within Bounds of Memory Buffer: CVE-2016-0860
  10. Improper Input Validation: CVE-2016-0853
  11. Cross-Site Scripting: CVE-2015-3948
  12. SQL Injection: CVE-2015-3947
  13. Cross Site Request Forgery: CVE- 2015-3946
  14. External Control of File Name or Path: CVE-2015-6467
  15. Clear Text Storage of Sensitive Information : CVE-2015-3943

Suggested action

CCIRC recommends that system administrators test and deploy version 8.1 of WebAccess the newly released version that is designed to address the reported vulnerabilities.

References

https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01
http://www.advantech.com/industrial-automation/webaccess/download

Date modified: