ID

VAR-201906-1029


CVE

CVE-2019-10993


TITLE

Advantech WebAccess/SCADA Arbitrary code execution vulnerability

Trust: 0.8

sources: IVD: d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07 // CNVD: CNVD-2019-32473

DESCRIPTION

In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment

Trust: 11.07

sources: NVD: CVE-2019-10993 // ZDI: ZDI-19-599 // ZDI: ZDI-19-623 // ZDI: ZDI-19-601 // ZDI: ZDI-19-615 // ZDI: ZDI-19-593 // ZDI: ZDI-19-614 // ZDI: ZDI-19-605 // ZDI: ZDI-19-603 // ZDI: ZDI-19-612 // ZDI: ZDI-19-611 // ZDI: ZDI-19-595 // ZDI: ZDI-19-606 // ZDI: ZDI-19-616 // ZDI: ZDI-19-610 // ZDI: ZDI-19-613 // CNVD: CNVD-2019-32473 // IVD: d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07 // CNVD: CNVD-2019-32473

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope: - version: -

Trust: 10.5

vendor:advantechmodel:webaccessscope:lteversion:8.3.5

Trust: 1.0

vendor:advantechmodel:webaccess/scadascope:lteversion:<=8.3.5

Trust: 0.6

vendor:webaccessmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07 // ZDI: ZDI-19-599 // ZDI: ZDI-19-613 // ZDI: ZDI-19-610 // ZDI: ZDI-19-616 // ZDI: ZDI-19-606 // ZDI: ZDI-19-595 // ZDI: ZDI-19-611 // ZDI: ZDI-19-612 // ZDI: ZDI-19-603 // ZDI: ZDI-19-605 // ZDI: ZDI-19-614 // ZDI: ZDI-19-593 // ZDI: ZDI-19-615 // ZDI: ZDI-19-601 // ZDI: ZDI-19-623 // CNVD: CNVD-2019-32473 // NVD: CVE-2019-10993

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2019-10993
value: CRITICAL

Trust: 10.5

nvd@nist.gov: CVE-2019-10993
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2019-32473
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201906-1077
value: CRITICAL

Trust: 0.6

IVD: d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2019-10993
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2019-32473
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

ZDI: CVE-2019-10993
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 10.5

nvd@nist.gov: CVE-2019-10993
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: IVD: d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07 // ZDI: ZDI-19-599 // ZDI: ZDI-19-613 // ZDI: ZDI-19-610 // ZDI: ZDI-19-616 // ZDI: ZDI-19-606 // ZDI: ZDI-19-595 // ZDI: ZDI-19-611 // ZDI: ZDI-19-612 // ZDI: ZDI-19-603 // ZDI: ZDI-19-605 // ZDI: ZDI-19-614 // ZDI: ZDI-19-593 // ZDI: ZDI-19-615 // ZDI: ZDI-19-601 // ZDI: ZDI-19-623 // CNVD: CNVD-2019-32473 // CNNVD: CNNVD-201906-1077 // NVD: CVE-2019-10993

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

sources: NVD: CVE-2019-10993

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-1077

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201906-1077

PATCH

title:Advantech has issued an update to correct this vulnerability.url:https://www.us-cert.gov/ics/advisories/icsa-19-178-05

Trust: 10.5

title:Patch for Advantech WebAccess/SCADA arbitrary code execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/181487

Trust: 0.6

title:Advantech WebAccess/SCADA Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94180

Trust: 0.6

sources: ZDI: ZDI-19-599 // ZDI: ZDI-19-613 // ZDI: ZDI-19-610 // ZDI: ZDI-19-616 // ZDI: ZDI-19-606 // ZDI: ZDI-19-595 // ZDI: ZDI-19-611 // ZDI: ZDI-19-612 // ZDI: ZDI-19-603 // ZDI: ZDI-19-605 // ZDI: ZDI-19-614 // ZDI: ZDI-19-593 // ZDI: ZDI-19-615 // ZDI: ZDI-19-601 // ZDI: ZDI-19-623 // CNVD: CNVD-2019-32473 // CNNVD: CNNVD-201906-1077

EXTERNAL IDS

db:NVDid:CVE-2019-10993

Trust: 12.9

db:ZDIid:ZDI-19-613

Trust: 2.3

db:ZDIid:ZDI-19-616

Trust: 2.3

db:ZDIid:ZDI-19-606

Trust: 2.3

db:ZDIid:ZDI-19-611

Trust: 2.3

db:ZDIid:ZDI-19-612

Trust: 2.3

db:ZDIid:ZDI-19-603

Trust: 2.3

db:ZDIid:ZDI-19-605

Trust: 2.3

db:ZDIid:ZDI-19-614

Trust: 2.3

db:ZDIid:ZDI-19-615

Trust: 2.3

db:ZDIid:ZDI-19-601

Trust: 2.3

db:ZDIid:ZDI-19-623

Trust: 2.3

db:ZDIid:ZDI-19-607

Trust: 1.6

db:ZDIid:ZDI-19-618

Trust: 1.6

db:ZDIid:ZDI-19-597

Trust: 1.6

db:ZDIid:ZDI-19-602

Trust: 1.6

db:ZDIid:ZDI-19-617

Trust: 1.6

db:ZDIid:ZDI-19-598

Trust: 1.6

db:ICS CERTid:ICSA-19-178-05

Trust: 1.6

db:CNVDid:CNVD-2019-32473

Trust: 0.8

db:CNNVDid:CNNVD-201906-1077

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-8129

Trust: 0.7

db:ZDIid:ZDI-19-599

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8146

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8143

Trust: 0.7

db:ZDIid:ZDI-19-610

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8150

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8139

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8118

Trust: 0.7

db:ZDIid:ZDI-19-595

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8144

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8145

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8136

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8138

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8147

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8116

Trust: 0.7

db:ZDIid:ZDI-19-593

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8148

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8133

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8119

Trust: 0.7

db:AUSCERTid:ESB-2019.2350

Trust: 0.6

db:BIDid:108923

Trust: 0.6

db:IVDid:D5DCD84F-1ACA-4DC3-AC16-D5C7C3DD4D07

Trust: 0.2

sources: IVD: d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07 // ZDI: ZDI-19-599 // ZDI: ZDI-19-613 // ZDI: ZDI-19-610 // ZDI: ZDI-19-616 // ZDI: ZDI-19-606 // ZDI: ZDI-19-595 // ZDI: ZDI-19-611 // ZDI: ZDI-19-612 // ZDI: ZDI-19-603 // ZDI: ZDI-19-605 // ZDI: ZDI-19-614 // ZDI: ZDI-19-593 // ZDI: ZDI-19-615 // ZDI: ZDI-19-601 // ZDI: ZDI-19-623 // CNVD: CNVD-2019-32473 // CNNVD: CNNVD-201906-1077 // NVD: CVE-2019-10993

REFERENCES

url:https://www.us-cert.gov/ics/advisories/icsa-19-178-05

Trust: 12.1

url:https://www.zerodayinitiative.com/advisories/zdi-19-623/

Trust: 2.2

url:https://www.zerodayinitiative.com/advisories/zdi-19-597/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-611/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-601/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-612/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-598/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-615/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-605/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-616/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-602/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-613/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-603/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-614/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-606/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-617/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-607/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-618/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-10993

Trust: 1.2

url:http://webaccess.advantech.com

Trust: 0.6

url:https://www.securityfocus.com/bid/108923

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2350/

Trust: 0.6

sources: ZDI: ZDI-19-599 // ZDI: ZDI-19-613 // ZDI: ZDI-19-610 // ZDI: ZDI-19-616 // ZDI: ZDI-19-606 // ZDI: ZDI-19-595 // ZDI: ZDI-19-611 // ZDI: ZDI-19-612 // ZDI: ZDI-19-603 // ZDI: ZDI-19-605 // ZDI: ZDI-19-614 // ZDI: ZDI-19-593 // ZDI: ZDI-19-615 // ZDI: ZDI-19-601 // ZDI: ZDI-19-623 // CNVD: CNVD-2019-32473 // CNNVD: CNNVD-201906-1077 // NVD: CVE-2019-10993

CREDITS

Natnael Samson (@NattiSamson)

Trust: 9.8

sources: ZDI: ZDI-19-599 // ZDI: ZDI-19-613 // ZDI: ZDI-19-610 // ZDI: ZDI-19-616 // ZDI: ZDI-19-606 // ZDI: ZDI-19-595 // ZDI: ZDI-19-611 // ZDI: ZDI-19-612 // ZDI: ZDI-19-603 // ZDI: ZDI-19-605 // ZDI: ZDI-19-614 // ZDI: ZDI-19-593 // ZDI: ZDI-19-615 // ZDI: ZDI-19-601

SOURCES

db:IVDid:d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07
db:ZDIid:ZDI-19-599
db:ZDIid:ZDI-19-613
db:ZDIid:ZDI-19-610
db:ZDIid:ZDI-19-616
db:ZDIid:ZDI-19-606
db:ZDIid:ZDI-19-595
db:ZDIid:ZDI-19-611
db:ZDIid:ZDI-19-612
db:ZDIid:ZDI-19-603
db:ZDIid:ZDI-19-605
db:ZDIid:ZDI-19-614
db:ZDIid:ZDI-19-593
db:ZDIid:ZDI-19-615
db:ZDIid:ZDI-19-601
db:ZDIid:ZDI-19-623
db:CNVDid:CNVD-2019-32473
db:CNNVDid:CNNVD-201906-1077
db:NVDid:CVE-2019-10993

LAST UPDATE DATE

2024-11-20T22:41:09.421000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-19-599date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-613date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-610date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-616date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-606date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-595date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-611date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-612date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-603date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-605date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-614date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-593date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-615date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-601date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-623date:2024-01-19T00:00:00
db:CNVDid:CNVD-2019-32473date:2019-09-21T00:00:00
db:CNNVDid:CNNVD-201906-1077date:2022-04-19T00:00:00
db:NVDid:CVE-2019-10993date:2022-04-18T17:17:47.753

SOURCES RELEASE DATE

db:IVDid:d5dcd84f-1aca-4dc3-ac16-d5c7c3dd4d07date:2019-09-21T00:00:00
db:ZDIid:ZDI-19-599date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-613date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-610date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-616date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-606date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-595date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-611date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-612date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-603date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-605date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-614date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-593date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-615date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-601date:2019-07-02T00:00:00
db:ZDIid:ZDI-19-623date:2019-07-02T00:00:00
db:CNVDid:CNVD-2019-32473date:2019-09-21T00:00:00
db:CNNVDid:CNNVD-201906-1077date:2019-06-27T00:00:00
db:NVDid:CVE-2019-10993date:2019-06-28T21:15:11.353