ID

VAR-201805-0250


CVE

CVE-2018-10590


TITLE

Advantech WebAccess Vulnerable to file and directory information disclosure

Trust: 0.8

sources: JVNDB: JVNDB-2018-005068

DESCRIPTION

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an information exposure vulnerability through directory listing has been identified, which may allow an attacker to find important files that are not normally visible. Advantech WebAccess Contains a vulnerability in the disclosure of file and directory information.Information may be obtained. Advantech WebAccess and others are products of Advantech. Advantech WebAccess is a browser-based HMI/SCADA software. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. WebAccess Dashboard is one of the dashboard components; WebAccess Scada Node is one of the monitoring node components. WebAccess/NMS is a suite of web browsers for the Network Management System (NMS). Security vulnerabilities exist in several Advantech products. An attacker could exploit this vulnerability to obtain important files that are not visible. Multiple SQL-injection vulnerabilities 2. An information-disclosure vulnerability 3. A file-upload vulnerability 4. Multiple directory-traversal vulnerabilities 5. Multiple stack-based buffer-overflow vulnerabilities 6. A heap-based buffer-overflow vulnerability 7. Multiple arbitrary code-execution vulnerabilities 8. A denial-of-service vulnerability 9. A security-bypass vulnerability 10. A privilege-escalation vulnerability An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database, delete arbitrary files, gain elevated privileges, perform certain unauthorized actions, upload arbitrary files to the affected application gain unauthorized access and obtain sensitive information. Failed attacks will cause denial of service conditions. Advantech WebAccess, etc. Advantech WebAccess is a set of HMI/SCADA software based on browser architecture. The following versions are affected: Advantech WebAccess 8.2_20170817 and earlier, 8.3.0 and earlier; WebAccess Dashboard 2.0.15 and earlier; WebAccess Scada Node 8.3.1 and earlier; WebAccess/NMS 2.0.3 and earlier

Trust: 2.7

sources: NVD: CVE-2018-10590 // JVNDB: JVNDB-2018-005068 // CNVD: CNVD-2018-09823 // BID: 104190 // IVD: e2ef868f-39ab-11e9-8037-000c29342cb1 // VULHUB: VHN-120365

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2ef868f-39ab-11e9-8037-000c29342cb1 // CNVD: CNVD-2018-09823

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:lteversion:8.2_20170817

Trust: 1.8

vendor:advantechmodel:webaccessscope:lteversion:8.3.0

Trust: 1.8

vendor:advantechmodel:webaccess dashboardscope:lteversion:2.0.15

Trust: 1.8

vendor:advantechmodel:webaccess scada nodescope:ltversion:8.3.1

Trust: 1.4

vendor:advantechmodel:webaccess scadascope:ltversion:8.3.1

Trust: 1.0

vendor:advantechmodel:webaccess\/nmsscope:lteversion:2.0.3

Trust: 1.0

vendor:advantechmodel:webaccess dashboardscope:eqversion:2.0.15

Trust: 0.9

vendor:advantechmodel:webaccess/nmsscope:lteversion:2.0.3

Trust: 0.8

vendor:advantechmodel:webaccess dashboardscope:lteversion:<=2.0.15

Trust: 0.6

vendor:advantechmodel:webaccess/nmsscope:lteversion:<=2.0.3

Trust: 0.6

vendor:advantechmodel:webaccessscope:eqversion:8.3.0

Trust: 0.6

vendor:advantechmodel:webaccessscope:eqversion:8.2_20170817

Trust: 0.6

vendor:advantechmodel:webaccess\/nmsscope:eqversion:2.0.3

Trust: 0.6

vendor:webaccessmodel: - scope:eqversion:*

Trust: 0.4

vendor:advantechmodel:webaccess/nmsscope:eqversion:2.0.3

Trust: 0.3

vendor:advantechmodel:webaccess/nmsscope:eqversion:2.0

Trust: 0.3

vendor:advantechmodel:webaccess scada nodescope:eqversion:8.3

Trust: 0.3

vendor:advantechmodel:webaccess dashboardscope:eqversion:2.0

Trust: 0.3

vendor:advantechmodel:webaccessscope:eqversion:8.3

Trust: 0.3

vendor:advantechmodel:webaccess 8.2 20170817scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccess 8.2 20170330scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccessscope:eqversion:8.2

Trust: 0.3

vendor:advantechmodel:webaccess 8.1 20160519scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccessscope:eqversion:8.1

Trust: 0.3

vendor:advantechmodel:webaccess 8.0 20150816scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccessscope:eqversion:8

Trust: 0.3

vendor:advantechmodel:webaccessscope:neversion:8.3.1

Trust: 0.3

vendor:webaccess dashboardmodel: - scope:eqversion:*

Trust: 0.2

vendor:webaccess scadamodel: - scope:eqversion:*

Trust: 0.2

vendor:webaccess nmsmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2ef868f-39ab-11e9-8037-000c29342cb1 // CNVD: CNVD-2018-09823 // BID: 104190 // JVNDB: JVNDB-2018-005068 // CNNVD: CNNVD-201805-450 // NVD: CVE-2018-10590

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-10590
value: HIGH

Trust: 1.0

NVD: CVE-2018-10590
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-09823
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201805-450
value: HIGH

Trust: 0.6

IVD: e2ef868f-39ab-11e9-8037-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-120365
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-10590
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-09823
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2ef868f-39ab-11e9-8037-000c29342cb1
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-120365
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-10590
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: e2ef868f-39ab-11e9-8037-000c29342cb1 // CNVD: CNVD-2018-09823 // VULHUB: VHN-120365 // JVNDB: JVNDB-2018-005068 // CNNVD: CNNVD-201805-450 // NVD: CVE-2018-10590

PROBLEMTYPE DATA

problemtype:CWE-538

Trust: 1.9

problemtype:CWE-548

Trust: 1.0

sources: VULHUB: VHN-120365 // JVNDB: JVNDB-2018-005068 // NVD: CVE-2018-10590

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201805-450

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201805-450

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-005068

PATCH

title:Advantech WebAccessurl:http://www.advantech.com/industrial-automation/webaccess/webaccessscada

Trust: 0.8

title:Patch for Advantech WebAccess Information Disclosure Vulnerability (CNVD-2018-09823)url:https://www.cnvd.org.cn/patchInfo/show/129391

Trust: 0.6

title:Multiple Advantech Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80060

Trust: 0.6

sources: CNVD: CNVD-2018-09823 // JVNDB: JVNDB-2018-005068 // CNNVD: CNNVD-201805-450

EXTERNAL IDS

db:NVDid:CVE-2018-10590

Trust: 3.6

db:ICS CERTid:ICSA-18-135-01

Trust: 3.4

db:BIDid:104190

Trust: 2.0

db:CNVDid:CNVD-2018-09823

Trust: 0.8

db:CNNVDid:CNNVD-201805-450

Trust: 0.8

db:JVNDBid:JVNDB-2018-005068

Trust: 0.8

db:IVDid:E2EF868F-39AB-11E9-8037-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-120365

Trust: 0.1

sources: IVD: e2ef868f-39ab-11e9-8037-000c29342cb1 // CNVD: CNVD-2018-09823 // VULHUB: VHN-120365 // BID: 104190 // JVNDB: JVNDB-2018-005068 // CNNVD: CNNVD-201805-450 // NVD: CVE-2018-10590

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-135-01

Trust: 3.4

url:http://www.securityfocus.com/bid/104190

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10590

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-10590

Trust: 0.8

url:http://webaccess.advantech.com

Trust: 0.3

sources: CNVD: CNVD-2018-09823 // VULHUB: VHN-120365 // BID: 104190 // JVNDB: JVNDB-2018-005068 // CNNVD: CNNVD-201805-450 // NVD: CVE-2018-10590

CREDITS

Mat Powell, rgod, Steven Seeley, Donato Onofri and Simone Onofri

Trust: 0.3

sources: BID: 104190

SOURCES

db:IVDid:e2ef868f-39ab-11e9-8037-000c29342cb1
db:CNVDid:CNVD-2018-09823
db:VULHUBid:VHN-120365
db:BIDid:104190
db:JVNDBid:JVNDB-2018-005068
db:CNNVDid:CNNVD-201805-450
db:NVDid:CVE-2018-10590

LAST UPDATE DATE

2024-08-14T13:45:48.228000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-09823date:2018-05-18T00:00:00
db:VULHUBid:VHN-120365date:2019-10-09T00:00:00
db:BIDid:104190date:2018-05-15T00:00:00
db:JVNDBid:JVNDB-2018-005068date:2018-07-05T00:00:00
db:CNNVDid:CNNVD-201805-450date:2019-10-17T00:00:00
db:NVDid:CVE-2018-10590date:2019-10-09T23:32:51.493

SOURCES RELEASE DATE

db:IVDid:e2ef868f-39ab-11e9-8037-000c29342cb1date:2018-05-18T00:00:00
db:CNVDid:CNVD-2018-09823date:2018-05-17T00:00:00
db:VULHUBid:VHN-120365date:2018-05-15T00:00:00
db:BIDid:104190date:2018-05-15T00:00:00
db:JVNDBid:JVNDB-2018-005068date:2018-07-05T00:00:00
db:CNNVDid:CNNVD-201805-450date:2018-05-16T00:00:00
db:NVDid:CVE-2018-10590date:2018-05-15T22:29:00.317