ID

VAR-201407-0237


CVE

CVE-2014-2368


TITLE

Advantech WebAccess bwocxrun Unsafe ActiveX Control Information Disclosure Vulnerability

Trust: 1.0

sources: IVD: 7d7fc401-463f-11e9-82e2-000c29342cb1 // IVD: e49f790a-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-04532

DESCRIPTION

The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists with the bwocxrun ActiveX control, which allows for navigation from the network to the local file system. When combined with system settings and other components included as part of the installation, this allows for the activation of ActiveX controls resident on the local file system (even if not installed) without user interaction. An attacker can use this to install vulnerable controls on the target system. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess is prone to a remote security weakness. This may aid in further attacks. Advantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There is a security vulnerability in the 'BrowseFolder' method in the bwocxrun ActiveX control of Advantech WebAccess 7.1 and earlier

Trust: 3.51

sources: NVD: CVE-2014-2368 // JVNDB: JVNDB-2014-003491 // ZDI: ZDI-14-245 // CNVD: CNVD-2014-04532 // BID: 68715 // IVD: 7d7fc401-463f-11e9-82e2-000c29342cb1 // IVD: e49f790a-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-70307

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 7d7fc401-463f-11e9-82e2-000c29342cb1 // IVD: e49f790a-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-04532

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:eqversion:7.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:eqversion:5.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:eqversion:6.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:ltversion:7.2

Trust: 1.4

vendor:advantechmodel:webaccessscope:eqversion:7.1

Trust: 1.2

vendor:advantechmodel:webaccessscope:lteversion:7.1

Trust: 1.0

vendor:advantechmodel:webaccessscope: - version: -

Trust: 0.7

vendor:advantech webaccessmodel: - scope:eqversion:5.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:6.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:7.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:*

Trust: 0.4

sources: IVD: 7d7fc401-463f-11e9-82e2-000c29342cb1 // IVD: e49f790a-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-245 // CNVD: CNVD-2014-04532 // JVNDB: JVNDB-2014-003491 // CNNVD: CNNVD-201407-480 // NVD: CVE-2014-2368

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2368
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-2368
value: MEDIUM

Trust: 0.8

ZDI: CVE-2014-2368
value: HIGH

Trust: 0.7

CNVD: CNVD-2014-04532
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201407-480
value: MEDIUM

Trust: 0.6

IVD: 7d7fc401-463f-11e9-82e2-000c29342cb1
value: MEDIUM

Trust: 0.2

IVD: e49f790a-2351-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-70307
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-2368
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2014-2368
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2014-04532
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d7fc401-463f-11e9-82e2-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: e49f790a-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-70307
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 7d7fc401-463f-11e9-82e2-000c29342cb1 // IVD: e49f790a-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-245 // CNVD: CNVD-2014-04532 // VULHUB: VHN-70307 // JVNDB: JVNDB-2014-003491 // CNNVD: CNNVD-201407-480 // NVD: CVE-2014-2368

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-70307 // JVNDB: JVNDB-2014-003491 // NVD: CVE-2014-2368

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201407-480

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201407-480

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-003491

PATCH

title:Downloads ::: WebAccess Softwareurl:http://webaccess.advantech.com/downloads.php?item=software

Trust: 0.8

title:Advantech WebAccessurl:http://webaccess.advantech.com/

Trust: 0.8

title:Advantech has issued an update to correct this vulnerability.url:http://ics-cert.us-cert.gov/advisories/ICSA-14-198-02

Trust: 0.7

title:Advantech WebAccess bwocxrun unsafe ActiveX control information disclosure vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/47825

Trust: 0.6

title:AdvantechWebAccessCHNNode_20140606_3.4.3url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=50905

Trust: 0.6

sources: ZDI: ZDI-14-245 // CNVD: CNVD-2014-04532 // JVNDB: JVNDB-2014-003491 // CNNVD: CNNVD-201407-480

EXTERNAL IDS

db:NVDid:CVE-2014-2368

Trust: 4.5

db:ICS CERTid:ICSA-14-198-02

Trust: 3.1

db:CNNVDid:CNNVD-201407-480

Trust: 1.1

db:CNVDid:CNVD-2014-04532

Trust: 1.0

db:BIDid:68715

Trust: 1.0

db:JVNDBid:JVNDB-2014-003491

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2061

Trust: 0.7

db:ZDIid:ZDI-14-245

Trust: 0.7

db:IVDid:7D7FC401-463F-11E9-82E2-000C29342CB1

Trust: 0.2

db:IVDid:E49F790A-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-70307

Trust: 0.1

sources: IVD: 7d7fc401-463f-11e9-82e2-000c29342cb1 // IVD: e49f790a-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-245 // CNVD: CNVD-2014-04532 // VULHUB: VHN-70307 // BID: 68715 // JVNDB: JVNDB-2014-003491 // CNNVD: CNNVD-201407-480 // NVD: CVE-2014-2368

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-198-02

Trust: 3.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2368

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2368

Trust: 0.8

sources: ZDI: ZDI-14-245 // CNVD: CNVD-2014-04532 // VULHUB: VHN-70307 // JVNDB: JVNDB-2014-003491 // CNNVD: CNNVD-201407-480 // NVD: CVE-2014-2368

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-14-245

SOURCES

db:IVDid:7d7fc401-463f-11e9-82e2-000c29342cb1
db:IVDid:e49f790a-2351-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-14-245
db:CNVDid:CNVD-2014-04532
db:VULHUBid:VHN-70307
db:BIDid:68715
db:JVNDBid:JVNDB-2014-003491
db:CNNVDid:CNNVD-201407-480
db:NVDid:CVE-2014-2368

LAST UPDATE DATE

2024-08-14T14:06:29.085000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-245date:2014-07-18T00:00:00
db:CNVDid:CNVD-2014-04532date:2014-07-24T00:00:00
db:VULHUBid:VHN-70307date:2014-07-23T00:00:00
db:BIDid:68715date:2014-07-22T00:07:00
db:JVNDBid:JVNDB-2014-003491date:2014-07-22T00:00:00
db:CNNVDid:CNNVD-201407-480date:2014-07-24T00:00:00
db:NVDid:CVE-2014-2368date:2014-07-23T18:48:01.977

SOURCES RELEASE DATE

db:IVDid:7d7fc401-463f-11e9-82e2-000c29342cb1date:2014-07-24T00:00:00
db:IVDid:e49f790a-2351-11e6-abef-000c29c66e3ddate:2014-07-24T00:00:00
db:ZDIid:ZDI-14-245date:2014-07-18T00:00:00
db:CNVDid:CNVD-2014-04532date:2014-07-24T00:00:00
db:VULHUBid:VHN-70307date:2014-07-19T00:00:00
db:BIDid:68715date:2014-07-18T00:00:00
db:JVNDBid:JVNDB-2014-003491date:2014-07-22T00:00:00
db:CNNVDid:CNNVD-201407-480date:2014-07-24T00:00:00
db:NVDid:CVE-2014-2368date:2014-07-19T05:09:27.753