ID

VAR-201708-1122


CVE

CVE-2017-12708


TITLE

Advantech WebAccess Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-007574

DESCRIPTION

An Improper Restriction Of Operations Within The Bounds Of A Memory Buffer issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities that allow invalid locations to be referenced for the memory buffer, which may allow an attacker to execute arbitrary code or cause the system to crash. Advantech WebAccess Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. Multiple heap-based buffer-overflow vulnerabilities. 3. Multiple memory-corruption vulnerabilities. 4. An SQL-injection vulnerability. 5. A format-string vulnerability. 6. An authentication-bypass vulnerability. 7. A security-bypass vulnerability. 8. A privilege-escalation vulnerability. 9. A remote-code execution vulnerability. An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database,perform certain unauthorized actions, gain unauthorized access and gain elevated privileges. This may aid in further attacks. Advantech WebAccess versions prior to V8.2_20170817 are vulnerable

Trust: 2.79

sources: NVD: CVE-2017-12708 // JVNDB: JVNDB-2017-007574 // CNVD: CNVD-2017-23885 // BID: 100526 // IVD: 0cff38c7-68ab-44c3-a179-a49a32642390 // VULHUB: VHN-103257 // VULMON: CVE-2017-12708

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 0cff38c7-68ab-44c3-a179-a49a32642390 // CNVD: CNVD-2017-23885

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:lteversion:8.2

Trust: 1.0

vendor:advantechmodel:webaccessscope:eqversion:8.2

Trust: 0.9

vendor:advantechmodel:webaccessscope:ltversion:8.2_20170817

Trust: 0.8

vendor:advantechmodel:webaccess <v8.2 20170817scope: - version: -

Trust: 0.6

vendor:advantechmodel:webaccess 8.2 20170330scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccess 8.1 20160519scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccess 8.0 20150816scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccessscope:eqversion:8

Trust: 0.3

vendor:advantechmodel:webaccess 8.2 20170817scope:neversion: -

Trust: 0.3

vendor:advantechmodel:webaccessscope:neversion:8.1

Trust: 0.3

vendor:webaccessmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 0cff38c7-68ab-44c3-a179-a49a32642390 // CNVD: CNVD-2017-23885 // BID: 100526 // JVNDB: JVNDB-2017-007574 // CNNVD: CNNVD-201708-1278 // NVD: CVE-2017-12708

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12708
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-12708
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-23885
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201708-1278
value: CRITICAL

Trust: 0.6

IVD: 0cff38c7-68ab-44c3-a179-a49a32642390
value: CRITICAL

Trust: 0.2

VULHUB: VHN-103257
value: HIGH

Trust: 0.1

VULMON: CVE-2017-12708
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-12708
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-23885
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 0cff38c7-68ab-44c3-a179-a49a32642390
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-103257
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12708
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 0cff38c7-68ab-44c3-a179-a49a32642390 // CNVD: CNVD-2017-23885 // VULHUB: VHN-103257 // VULMON: CVE-2017-12708 // JVNDB: JVNDB-2017-007574 // CNNVD: CNNVD-201708-1278 // NVD: CVE-2017-12708

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-103257 // JVNDB: JVNDB-2017-007574 // NVD: CVE-2017-12708

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201708-1278

TYPE

Buffer error

Trust: 0.8

sources: IVD: 0cff38c7-68ab-44c3-a179-a49a32642390 // CNNVD: CNNVD-201708-1278

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007574

PATCH

title:Advantech WebAccessurl:http://www.advantech.com/industrial-automation/webaccess

Trust: 0.8

title:Patch for Advantech WebAccess Buffer Overflow Vulnerability (CNVD-2017-23885)url:https://www.cnvd.org.cn/patchInfo/show/101169

Trust: 0.6

title:Advantech WebAccess Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74367

Trust: 0.6

sources: CNVD: CNVD-2017-23885 // JVNDB: JVNDB-2017-007574 // CNNVD: CNNVD-201708-1278

EXTERNAL IDS

db:NVDid:CVE-2017-12708

Trust: 3.7

db:ICS CERTid:ICSA-17-241-02

Trust: 3.5

db:BIDid:100526

Trust: 2.1

db:CNNVDid:CNNVD-201708-1278

Trust: 0.9

db:CNVDid:CNVD-2017-23885

Trust: 0.8

db:JVNDBid:JVNDB-2017-007574

Trust: 0.8

db:IVDid:0CFF38C7-68AB-44C3-A179-A49A32642390

Trust: 0.2

db:VULHUBid:VHN-103257

Trust: 0.1

db:VULMONid:CVE-2017-12708

Trust: 0.1

sources: IVD: 0cff38c7-68ab-44c3-a179-a49a32642390 // CNVD: CNVD-2017-23885 // VULHUB: VHN-103257 // VULMON: CVE-2017-12708 // BID: 100526 // JVNDB: JVNDB-2017-007574 // CNNVD: CNNVD-201708-1278 // NVD: CVE-2017-12708

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-241-02

Trust: 3.5

url:http://www.securityfocus.com/bid/100526

Trust: 1.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12708

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12708

Trust: 0.8

url:http://webaccess.advantech.com

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2017-23885 // VULHUB: VHN-103257 // VULMON: CVE-2017-12708 // BID: 100526 // JVNDB: JVNDB-2017-007574 // CNNVD: CNNVD-201708-1278 // NVD: CVE-2017-12708

CREDITS

Fritz Sands, rgod, Tenable Network Security,an anonymous researcher all working with Trend Micro??s Zero Day Initiative, and Haojun Hou and DongWang from ADLab of Venustech.

Trust: 0.3

sources: BID: 100526

SOURCES

db:IVDid:0cff38c7-68ab-44c3-a179-a49a32642390
db:CNVDid:CNVD-2017-23885
db:VULHUBid:VHN-103257
db:VULMONid:CVE-2017-12708
db:BIDid:100526
db:JVNDBid:JVNDB-2017-007574
db:CNNVDid:CNNVD-201708-1278
db:NVDid:CVE-2017-12708

LAST UPDATE DATE

2024-08-14T13:29:58.115000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-23885date:2017-09-04T00:00:00
db:VULHUBid:VHN-103257date:2019-10-09T00:00:00
db:VULMONid:CVE-2017-12708date:2019-10-09T00:00:00
db:BIDid:100526date:2017-08-29T00:00:00
db:JVNDBid:JVNDB-2017-007574date:2017-09-25T00:00:00
db:CNNVDid:CNNVD-201708-1278date:2019-10-17T00:00:00
db:NVDid:CVE-2017-12708date:2019-10-09T23:23:10.653

SOURCES RELEASE DATE

db:IVDid:0cff38c7-68ab-44c3-a179-a49a32642390date:2017-08-30T00:00:00
db:CNVDid:CNVD-2017-23885date:2017-08-30T00:00:00
db:VULHUBid:VHN-103257date:2017-08-30T00:00:00
db:VULMONid:CVE-2017-12708date:2017-08-30T00:00:00
db:BIDid:100526date:2017-08-29T00:00:00
db:JVNDBid:JVNDB-2017-007574date:2017-09-25T00:00:00
db:CNNVDid:CNNVD-201708-1278date:2017-08-31T00:00:00
db:NVDid:CVE-2017-12708date:2017-08-30T18:29:00.530