Number: AV16-148
Date: 21 September 2016
Purpose
The purpose of this advisory is to bring attention to an identified unquoted service path escalation vulnerability in Moxa Active OPC Server.
Assessment
Successful exploitation of this vulnerability could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. The most recent version (2.4.19) serves to mitigate this vulnerability.
Version affected: Active OPC Server versions older than Version 2.4.19
CVE Reference: CVE-2016-5793
Suggested action
CCIRC recommends that system administrators test and deploy the vendor-released installations in accordance with the vendor's documentation. Active OPC Server is nearing end of life by the end of 2016, and no further updates will be issue.
References
http://www.moxa.com/support (link is external)
https://ics-cert.us-cert.gov/advisories/ICSA-16-264-01