ID

VAR-201805-0251


CVE

CVE-2018-10591


TITLE

Advantech WebAccess Source Validation Error Vulnerability

Trust: 0.8

sources: IVD: e2f0bf10-39ab-11e9-aed2-000c29342cb1 // CNVD: CNVD-2018-10703

DESCRIPTION

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an origin validation error vulnerability has been identified, which may allow an attacker can create a malicious web site, steal session cookies, and access data of authenticated users. Advantech WebAccess Contains a session fixation vulnerability.Information may be obtained. Advantech WebAccess and others are products of Advantech. Advantech WebAccess is a browser-based HMI/SCADA software. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. WebAccess Dashboard is one of the dashboard components; WebAccess Scada Node is one of the monitoring node components. WebAccess/NMS is a suite of web browsers for the Network Management System (NMS). Security vulnerabilities exist in several Advantech products. Multiple SQL-injection vulnerabilities 2. An information-disclosure vulnerability 3. A file-upload vulnerability 4. Multiple directory-traversal vulnerabilities 5. Multiple stack-based buffer-overflow vulnerabilities 6. A heap-based buffer-overflow vulnerability 7. Multiple arbitrary code-execution vulnerabilities 8. A denial-of-service vulnerability 9. A security-bypass vulnerability 10. A privilege-escalation vulnerability An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database, delete arbitrary files, gain elevated privileges, perform certain unauthorized actions, upload arbitrary files to the affected application gain unauthorized access and obtain sensitive information. Failed attacks will cause denial of service conditions. Advantech WebAccess, etc. Advantech WebAccess is a set of HMI/SCADA software based on browser architecture. The following versions are affected: Advantech WebAccess 8.2_20170817 and earlier, 8.3.0 and earlier; WebAccess Dashboard 2.0.15 and earlier; WebAccess Scada Node 8.3.1 and earlier; WebAccess/NMS 2.0.3 and earlier

Trust: 2.7

sources: NVD: CVE-2018-10591 // JVNDB: JVNDB-2018-005069 // CNVD: CNVD-2018-10703 // BID: 104190 // IVD: e2f0bf10-39ab-11e9-aed2-000c29342cb1 // VULHUB: VHN-120366

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2f0bf10-39ab-11e9-aed2-000c29342cb1 // CNVD: CNVD-2018-10703

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:lteversion:8.2_20170817

Trust: 1.8

vendor:advantechmodel:webaccessscope:lteversion:8.3.0

Trust: 1.8

vendor:advantechmodel:webaccess dashboardscope:lteversion:2.0.15

Trust: 1.8

vendor:advantechmodel:webaccess scada nodescope:ltversion:8.3.1

Trust: 1.4

vendor:advantechmodel:webaccess scadascope:ltversion:8.3.1

Trust: 1.0

vendor:advantechmodel:webaccess\/nmsscope:lteversion:2.0.3

Trust: 1.0

vendor:advantechmodel:webaccess dashboardscope:eqversion:2.0.15

Trust: 0.9

vendor:advantechmodel:webaccess/nmsscope:lteversion:2.0.3

Trust: 0.8

vendor:advantechmodel:webaccess <=8.2 20170817scope: - version: -

Trust: 0.6

vendor:advantechmodel:webaccessscope:lteversion:<=8.3.0

Trust: 0.6

vendor:advantechmodel:webaccess dashboardscope:lteversion:<=2.0.15

Trust: 0.6

vendor:advantechmodel:webaccess/nmsscope:lteversion:<=2.0.3

Trust: 0.6

vendor:advantechmodel:webaccessscope:eqversion:8.3.0

Trust: 0.6

vendor:advantechmodel:webaccessscope:eqversion:8.2_20170817

Trust: 0.6

vendor:advantechmodel:webaccess\/nmsscope:eqversion:2.0.3

Trust: 0.6

vendor:webaccessmodel: - scope:eqversion:*

Trust: 0.4

vendor:advantechmodel:webaccess/nmsscope:eqversion:2.0.3

Trust: 0.3

vendor:advantechmodel:webaccess/nmsscope:eqversion:2.0

Trust: 0.3

vendor:advantechmodel:webaccess scada nodescope:eqversion:8.3

Trust: 0.3

vendor:advantechmodel:webaccess dashboardscope:eqversion:2.0

Trust: 0.3

vendor:advantechmodel:webaccessscope:eqversion:8.3

Trust: 0.3

vendor:advantechmodel:webaccess 8.2 20170817scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccess 8.2 20170330scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccessscope:eqversion:8.2

Trust: 0.3

vendor:advantechmodel:webaccess 8.1 20160519scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccessscope:eqversion:8.1

Trust: 0.3

vendor:advantechmodel:webaccess 8.0 20150816scope: - version: -

Trust: 0.3

vendor:advantechmodel:webaccessscope:eqversion:8

Trust: 0.3

vendor:advantechmodel:webaccessscope:neversion:8.3.1

Trust: 0.3

vendor:webaccess dashboardmodel: - scope:eqversion:*

Trust: 0.2

vendor:webaccess scadamodel: - scope:eqversion:*

Trust: 0.2

vendor:webaccess nmsmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2f0bf10-39ab-11e9-aed2-000c29342cb1 // CNVD: CNVD-2018-10703 // BID: 104190 // JVNDB: JVNDB-2018-005069 // CNNVD: CNNVD-201805-449 // NVD: CVE-2018-10591

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-10591
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-10591
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2018-10703
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201805-449
value: MEDIUM

Trust: 0.6

IVD: e2f0bf10-39ab-11e9-aed2-000c29342cb1
value: MEDIUM

Trust: 0.2

VULHUB: VHN-120366
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2018-10591
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-10703
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f0bf10-39ab-11e9-aed2-000c29342cb1
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-120366
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-10591
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 4.0
version: 3.0

Trust: 1.8

sources: IVD: e2f0bf10-39ab-11e9-aed2-000c29342cb1 // CNVD: CNVD-2018-10703 // VULHUB: VHN-120366 // JVNDB: JVNDB-2018-005069 // CNNVD: CNNVD-201805-449 // NVD: CVE-2018-10591

PROBLEMTYPE DATA

problemtype:CWE-384

Trust: 1.9

problemtype:CWE-346

Trust: 1.0

sources: VULHUB: VHN-120366 // JVNDB: JVNDB-2018-005069 // NVD: CVE-2018-10591

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201805-449

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201805-449

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-005069

PATCH

title:Advantech WebAccessurl:http://www.advantech.com/industrial-automation/webaccess/webaccessscada

Trust: 0.8

title:Advantech WebAccess Source Validation Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/130839

Trust: 0.6

title:Multiple Advantech Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80059

Trust: 0.6

sources: CNVD: CNVD-2018-10703 // JVNDB: JVNDB-2018-005069 // CNNVD: CNNVD-201805-449

EXTERNAL IDS

db:NVDid:CVE-2018-10591

Trust: 3.6

db:ICS CERTid:ICSA-18-135-01

Trust: 3.4

db:BIDid:104190

Trust: 2.6

db:CNNVDid:CNNVD-201805-449

Trust: 0.9

db:CNVDid:CNVD-2018-10703

Trust: 0.8

db:JVNDBid:JVNDB-2018-005069

Trust: 0.8

db:IVDid:E2F0BF10-39AB-11E9-AED2-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-120366

Trust: 0.1

sources: IVD: e2f0bf10-39ab-11e9-aed2-000c29342cb1 // CNVD: CNVD-2018-10703 // VULHUB: VHN-120366 // BID: 104190 // JVNDB: JVNDB-2018-005069 // CNNVD: CNNVD-201805-449 // NVD: CVE-2018-10591

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-135-01

Trust: 3.4

url:http://www.securityfocus.com/bid/104190

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10591

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-10591

Trust: 0.8

url:http://webaccess.advantech.com

Trust: 0.3

sources: CNVD: CNVD-2018-10703 // VULHUB: VHN-120366 // BID: 104190 // JVNDB: JVNDB-2018-005069 // CNNVD: CNNVD-201805-449 // NVD: CVE-2018-10591

CREDITS

Mat Powell, rgod, Steven Seeley, Donato Onofri and Simone Onofri

Trust: 0.3

sources: BID: 104190

SOURCES

db:IVDid:e2f0bf10-39ab-11e9-aed2-000c29342cb1
db:CNVDid:CNVD-2018-10703
db:VULHUBid:VHN-120366
db:BIDid:104190
db:JVNDBid:JVNDB-2018-005069
db:CNNVDid:CNNVD-201805-449
db:NVDid:CVE-2018-10591

LAST UPDATE DATE

2024-08-14T13:45:47.932000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-10703date:2018-05-31T00:00:00
db:VULHUBid:VHN-120366date:2019-10-09T00:00:00
db:BIDid:104190date:2018-05-15T00:00:00
db:JVNDBid:JVNDB-2018-005069date:2018-07-05T00:00:00
db:CNNVDid:CNNVD-201805-449date:2019-10-17T00:00:00
db:NVDid:CVE-2018-10591date:2019-10-09T23:32:51.617

SOURCES RELEASE DATE

db:IVDid:e2f0bf10-39ab-11e9-aed2-000c29342cb1date:2018-05-31T00:00:00
db:CNVDid:CNVD-2018-10703date:2018-05-31T00:00:00
db:VULHUBid:VHN-120366date:2018-05-15T00:00:00
db:BIDid:104190date:2018-05-15T00:00:00
db:JVNDBid:JVNDB-2018-005069date:2018-07-05T00:00:00
db:CNNVDid:CNNVD-201805-449date:2018-05-16T00:00:00
db:NVDid:CVE-2018-10591date:2018-05-15T22:29:00.363