ID

VAR-201407-0235


CVE

CVE-2014-2366


TITLE

Advantech WebAccess Password Disclosure Vulnerability

Trust: 1.3

sources: ZDI: ZDI-14-250 // CNVD: CNVD-2014-04530

DESCRIPTION

upAdminPg.asp in Advantech WebAccess before 7.2 allows remote authenticated users to discover credentials by reading HTML source code. This vulnerability allows remote attackers to disclose arbitrary credentials on vulnerable versions of Advantech WebAccess. Authentication is required to exploit this vulnerability. The specific flaw exists within the upAdminPg.asp component. An authenticated user can provide an arbitrary existing account name to this page and receive the account password. An attacker can leverage this vulnerability to then authenticate as the WebAccess Administrator. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess has a password disclosure vulnerability, and its upAdminPg.asp component contains passwords for specific accounts, allowing attackers to exploit vulnerabilities to obtain sensitive information. Advantech WebAccess is prone to a remote information-disclosure vulnerability. This may aid in further attacks. Advantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are security holes in the upAdminPg.asp script of Advantech WebAccess 7.1 and earlier versions

Trust: 3.51

sources: NVD: CVE-2014-2366 // JVNDB: JVNDB-2014-003489 // ZDI: ZDI-14-250 // CNVD: CNVD-2014-04530 // BID: 68717 // IVD: 7d7feb0f-463f-11e9-8e94-000c29342cb1 // IVD: e493ef22-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-70305

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 7d7feb0f-463f-11e9-8e94-000c29342cb1 // IVD: e493ef22-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-04530

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:eqversion:7.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:eqversion:5.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:eqversion:6.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:ltversion:7.2

Trust: 1.4

vendor:advantechmodel:webaccessscope:lteversion:7.1

Trust: 1.0

vendor:advantechmodel:webaccessscope: - version: -

Trust: 0.7

vendor:advantechmodel:webaccessscope:eqversion:7.1

Trust: 0.6

vendor:advantech webaccessmodel: - scope:eqversion:5.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:6.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:7.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:*

Trust: 0.4

sources: IVD: 7d7feb0f-463f-11e9-8e94-000c29342cb1 // IVD: e493ef22-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-250 // CNVD: CNVD-2014-04530 // JVNDB: JVNDB-2014-003489 // CNNVD: CNNVD-201407-478 // NVD: CVE-2014-2366

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2366
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-2366
value: MEDIUM

Trust: 0.8

ZDI: CVE-2014-2366
value: HIGH

Trust: 0.7

CNVD: CNVD-2014-04530
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201407-478
value: MEDIUM

Trust: 0.6

IVD: 7d7feb0f-463f-11e9-8e94-000c29342cb1
value: MEDIUM

Trust: 0.2

IVD: e493ef22-2351-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-70305
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-2366
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2014-2366
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2014-04530
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d7feb0f-463f-11e9-8e94-000c29342cb1
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: e493ef22-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-70305
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 7d7feb0f-463f-11e9-8e94-000c29342cb1 // IVD: e493ef22-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-250 // CNVD: CNVD-2014-04530 // VULHUB: VHN-70305 // JVNDB: JVNDB-2014-003489 // CNNVD: CNNVD-201407-478 // NVD: CVE-2014-2366

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-70305 // JVNDB: JVNDB-2014-003489 // NVD: CVE-2014-2366

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201407-478

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201407-478

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-003489

PATCH

title:Downloads ::: WebAccess Softwareurl:http://webaccess.advantech.com/downloads.php?item=software

Trust: 0.8

title:Advantech WebAccessurl:http://webaccess.advantech.com/

Trust: 0.8

title:Advantech has issued an update to correct this vulnerability.url:http://ics-cert.us-cert.gov/advisories/ICSA-14-198-02

Trust: 0.7

title:Patch for Advantech WebAccess Password Disclosure Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/47827

Trust: 0.6

sources: ZDI: ZDI-14-250 // CNVD: CNVD-2014-04530 // JVNDB: JVNDB-2014-003489

EXTERNAL IDS

db:NVDid:CVE-2014-2366

Trust: 4.5

db:ICS CERTid:ICSA-14-198-02

Trust: 3.1

db:CNNVDid:CNNVD-201407-478

Trust: 1.1

db:CNVDid:CNVD-2014-04530

Trust: 1.0

db:BIDid:68717

Trust: 1.0

db:JVNDBid:JVNDB-2014-003489

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2085

Trust: 0.7

db:ZDIid:ZDI-14-250

Trust: 0.7

db:IVDid:7D7FEB0F-463F-11E9-8E94-000C29342CB1

Trust: 0.2

db:IVDid:E493EF22-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-70305

Trust: 0.1

sources: IVD: 7d7feb0f-463f-11e9-8e94-000c29342cb1 // IVD: e493ef22-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-250 // CNVD: CNVD-2014-04530 // VULHUB: VHN-70305 // BID: 68717 // JVNDB: JVNDB-2014-003489 // CNNVD: CNNVD-201407-478 // NVD: CVE-2014-2366

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-198-02

Trust: 3.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2366

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2366

Trust: 0.8

sources: ZDI: ZDI-14-250 // CNVD: CNVD-2014-04530 // VULHUB: VHN-70305 // JVNDB: JVNDB-2014-003489 // CNNVD: CNNVD-201407-478 // NVD: CVE-2014-2366

CREDITS

John Leitch

Trust: 0.7

sources: ZDI: ZDI-14-250

SOURCES

db:IVDid:7d7feb0f-463f-11e9-8e94-000c29342cb1
db:IVDid:e493ef22-2351-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-14-250
db:CNVDid:CNVD-2014-04530
db:VULHUBid:VHN-70305
db:BIDid:68717
db:JVNDBid:JVNDB-2014-003489
db:CNNVDid:CNNVD-201407-478
db:NVDid:CVE-2014-2366

LAST UPDATE DATE

2024-08-14T14:06:29.035000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-250date:2014-07-18T00:00:00
db:CNVDid:CNVD-2014-04530date:2014-07-24T00:00:00
db:VULHUBid:VHN-70305date:2014-07-23T00:00:00
db:BIDid:68717date:2014-07-22T00:07:00
db:JVNDBid:JVNDB-2014-003489date:2014-07-22T00:00:00
db:CNNVDid:CNNVD-201407-478date:2014-07-24T00:00:00
db:NVDid:CVE-2014-2366date:2014-07-23T18:46:16.637

SOURCES RELEASE DATE

db:IVDid:7d7feb0f-463f-11e9-8e94-000c29342cb1date:2014-07-24T00:00:00
db:IVDid:e493ef22-2351-11e6-abef-000c29c66e3ddate:2014-07-24T00:00:00
db:ZDIid:ZDI-14-250date:2014-07-18T00:00:00
db:CNVDid:CNVD-2014-04530date:2014-07-24T00:00:00
db:VULHUBid:VHN-70305date:2014-07-19T00:00:00
db:BIDid:68717date:2014-07-15T00:00:00
db:JVNDBid:JVNDB-2014-003489date:2014-07-22T00:00:00
db:CNNVDid:CNNVD-201407-478date:2014-07-24T00:00:00
db:NVDid:CVE-2014-2366date:2014-07-19T05:09:27.673