ID

VAR-202110-0996


CVE

CVE-2021-38389


TITLE

Advantech WebAccess  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-013712

DESCRIPTION

Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code. Advantech WebAccess Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of IOCTL 0x1138B. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a set of browser-based HMI/SCADA software from Advantech. A stack buffer overflow vulnerability exists in Advantech WebAccess 9.02 and earlier

Trust: 2.97

sources: NVD: CVE-2021-38389 // JVNDB: JVNDB-2021-013712 // ZDI: ZDI-22-259 // CNVD: CNVD-2021-80266 // VULHUB: VHN-400026 // VULMON: CVE-2021-38389

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-80266

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:lteversion:9.0.2

Trust: 1.0

vendor:アドバンテック株式会社model:webaccessscope:lteversion:9.02 and earlier

Trust: 0.8

vendor:アドバンテック株式会社model:webaccessscope:eqversion: -

Trust: 0.8

vendor:advantechmodel:webaccessscope: - version: -

Trust: 0.7

vendor:advantechmodel:webaccessscope:lteversion:<=9.02

Trust: 0.6

sources: ZDI: ZDI-22-259 // CNVD: CNVD-2021-80266 // JVNDB: JVNDB-2021-013712 // NVD: CVE-2021-38389

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-38389
value: CRITICAL

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2021-38389
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-38389
value: CRITICAL

Trust: 0.8

ZDI: CVE-2021-38389
value: CRITICAL

Trust: 0.7

CNVD: CNVD-2021-80266
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202110-892
value: CRITICAL

Trust: 0.6

VULHUB: VHN-400026
value: HIGH

Trust: 0.1

VULMON: CVE-2021-38389
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-38389
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-80266
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-400026
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-38389
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-013712
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2021-38389
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-259 // CNVD: CNVD-2021-80266 // VULHUB: VHN-400026 // VULMON: CVE-2021-38389 // JVNDB: JVNDB-2021-013712 // CNNVD: CNNVD-202110-892 // NVD: CVE-2021-38389 // NVD: CVE-2021-38389

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-121

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-400026 // JVNDB: JVNDB-2021-013712 // NVD: CVE-2021-38389

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202110-892

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202110-892

PATCH

title:Top Pageurl:https://www.advantech.com/

Trust: 0.8

title:Advantech has issued an update to correct this vulnerability.url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-285-02

Trust: 0.7

title:Patch for Advantech WebAccess Stack Buffer Overflow Vulnerability (CNVD-2021-80266)url:https://www.cnvd.org.cn/patchInfo/show/294856

Trust: 0.6

title:Advantech WebAccess Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=166736

Trust: 0.6

sources: ZDI: ZDI-22-259 // CNVD: CNVD-2021-80266 // JVNDB: JVNDB-2021-013712 // CNNVD: CNNVD-202110-892

EXTERNAL IDS

db:NVDid:CVE-2021-38389

Trust: 4.7

db:ICS CERTid:ICSA-21-285-02

Trust: 3.2

db:ZDIid:ZDI-22-259

Trust: 1.3

db:JVNid:JVNVU97189148

Trust: 0.8

db:JVNDBid:JVNDB-2021-013712

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-12966

Trust: 0.7

db:CNVDid:CNVD-2021-80266

Trust: 0.6

db:CS-HELPid:SB2021101312

Trust: 0.6

db:AUSCERTid:ESB-2021.3440

Trust: 0.6

db:CNNVDid:CNNVD-202110-892

Trust: 0.6

db:VULHUBid:VHN-400026

Trust: 0.1

db:VULMONid:CVE-2021-38389

Trust: 0.1

sources: ZDI: ZDI-22-259 // CNVD: CNVD-2021-80266 // VULHUB: VHN-400026 // VULMON: CVE-2021-38389 // JVNDB: JVNDB-2021-013712 // CNNVD: CNNVD-202110-892 // NVD: CVE-2021-38389

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-285-02

Trust: 3.0

url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-285-02

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-38389

Trust: 1.4

url:http://jvn.jp/vu/jvnvu97189148/index.html

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.3440

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-22-259/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021101312

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-22-259 // CNVD: CNVD-2021-80266 // VULHUB: VHN-400026 // VULMON: CVE-2021-38389 // JVNDB: JVNDB-2021-013712 // CNNVD: CNNVD-202110-892 // NVD: CVE-2021-38389

CREDITS

Natnael Samson (@NattiSamson)

Trust: 1.3

sources: ZDI: ZDI-22-259 // CNNVD: CNNVD-202110-892

SOURCES

db:ZDIid:ZDI-22-259
db:CNVDid:CNVD-2021-80266
db:VULHUBid:VHN-400026
db:VULMONid:CVE-2021-38389
db:JVNDBid:JVNDB-2021-013712
db:CNNVDid:CNNVD-202110-892
db:NVDid:CVE-2021-38389

LAST UPDATE DATE

2024-08-14T14:03:02.741000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-259date:2022-02-02T00:00:00
db:CNVDid:CNVD-2021-80266date:2022-01-18T00:00:00
db:VULHUBid:VHN-400026date:2021-10-20T00:00:00
db:VULMONid:CVE-2021-38389date:2021-10-20T00:00:00
db:JVNDBid:JVNDB-2021-013712date:2022-09-27T02:11:00
db:CNNVDid:CNNVD-202110-892date:2022-02-07T00:00:00
db:NVDid:CVE-2021-38389date:2021-10-20T22:17:57.443

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-259date:2022-02-02T00:00:00
db:CNVDid:CNVD-2021-80266date:2021-10-26T00:00:00
db:VULHUBid:VHN-400026date:2021-10-18T00:00:00
db:VULMONid:CVE-2021-38389date:2021-10-18T00:00:00
db:JVNDBid:JVNDB-2021-013712date:2022-09-27T00:00:00
db:CNNVDid:CNNVD-202110-892date:2021-10-12T00:00:00
db:NVDid:CVE-2021-38389date:2021-10-18T13:15:09.507