ID

VAR-202110-0997


CVE

CVE-2021-33023


TITLE

Advantech WebAccess IOCTL 0x2722 Heap-based Buffer Overflow Remote Code Execution Vulnerability

Trust: 1.4

sources: ZDI: ZDI-22-258 // ZDI: ZDI-22-257

DESCRIPTION

Advantech WebAccess versions 9.02 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute code. Advantech WebAccess Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of IOCTL 0x2722. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a set of browser-based HMI/SCADA software from Advantech. A heap buffer overflow vulnerability exists in Advantech WebAccess 9.02 and earlier. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment

Trust: 3.6

sources: NVD: CVE-2021-33023 // JVNDB: JVNDB-2021-013714 // ZDI: ZDI-22-258 // ZDI: ZDI-22-257 // CNVD: CNVD-2021-80267 // VULHUB: VHN-393009 // VULMON: CVE-2021-33023

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-80267

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope: - version: -

Trust: 1.4

vendor:advantechmodel:webaccessscope:lteversion:9.0.2

Trust: 1.0

vendor:アドバンテック株式会社model:webaccessscope:lteversion:9.02 and earlier

Trust: 0.8

vendor:アドバンテック株式会社model:webaccessscope:eqversion: -

Trust: 0.8

vendor:advantechmodel:webaccessscope:lteversion:<=9.02

Trust: 0.6

sources: ZDI: ZDI-22-258 // ZDI: ZDI-22-257 // CNVD: CNVD-2021-80267 // JVNDB: JVNDB-2021-013714 // NVD: CVE-2021-33023

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2021-33023
value: CRITICAL

Trust: 1.4

nvd@nist.gov: CVE-2021-33023
value: CRITICAL

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2021-33023
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-33023
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2021-80267
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202110-897
value: CRITICAL

Trust: 0.6

VULHUB: VHN-393009
value: HIGH

Trust: 0.1

VULMON: CVE-2021-33023
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-33023
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-80267
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-393009
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-33023
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

ZDI: CVE-2021-33023
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.4

OTHER: JVNDB-2021-013714
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: ZDI: ZDI-22-258 // ZDI: ZDI-22-257 // CNVD: CNVD-2021-80267 // VULHUB: VHN-393009 // VULMON: CVE-2021-33023 // JVNDB: JVNDB-2021-013714 // CNNVD: CNNVD-202110-897 // NVD: CVE-2021-33023 // NVD: CVE-2021-33023

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-122

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-393009 // JVNDB: JVNDB-2021-013714 // NVD: CVE-2021-33023

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202110-897

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202110-897

PATCH

title:Advantech has issued an update to correct this vulnerability.url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-285-02

Trust: 1.4

title:Top Pageurl:https://www.advantech.com/

Trust: 0.8

title:Patch for Advantech WebAccess Heap Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/294871

Trust: 0.6

title:Advantech WebAccess Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=166738

Trust: 0.6

sources: ZDI: ZDI-22-258 // ZDI: ZDI-22-257 // CNVD: CNVD-2021-80267 // JVNDB: JVNDB-2021-013714 // CNNVD: CNNVD-202110-897

EXTERNAL IDS

db:NVDid:CVE-2021-33023

Trust: 5.4

db:ICS CERTid:ICSA-21-285-02

Trust: 3.2

db:ZDIid:ZDI-22-257

Trust: 1.3

db:JVNid:JVNVU97189148

Trust: 0.8

db:JVNDBid:JVNDB-2021-013714

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-12944

Trust: 0.7

db:ZDIid:ZDI-22-258

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-12942

Trust: 0.7

db:CNNVDid:CNNVD-202110-897

Trust: 0.7

db:CNVDid:CNVD-2021-80267

Trust: 0.6

db:CS-HELPid:SB2021101312

Trust: 0.6

db:AUSCERTid:ESB-2021.3440

Trust: 0.6

db:VULHUBid:VHN-393009

Trust: 0.1

db:VULMONid:CVE-2021-33023

Trust: 0.1

sources: ZDI: ZDI-22-258 // ZDI: ZDI-22-257 // CNVD: CNVD-2021-80267 // VULHUB: VHN-393009 // VULMON: CVE-2021-33023 // JVNDB: JVNDB-2021-013714 // CNNVD: CNNVD-202110-897 // NVD: CVE-2021-33023

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-285-02

Trust: 3.0

url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-285-02

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-33023

Trust: 1.4

url:http://jvn.jp/vu/jvnvu97189148/index.html

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.3440

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-22-257/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021101312

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-22-258 // ZDI: ZDI-22-257 // CNVD: CNVD-2021-80267 // VULHUB: VHN-393009 // VULMON: CVE-2021-33023 // JVNDB: JVNDB-2021-013714 // CNNVD: CNNVD-202110-897 // NVD: CVE-2021-33023

CREDITS

Natnael Samson(@NattiSamson)

Trust: 2.0

sources: ZDI: ZDI-22-258 // ZDI: ZDI-22-257 // CNNVD: CNNVD-202110-897

SOURCES

db:ZDIid:ZDI-22-258
db:ZDIid:ZDI-22-257
db:CNVDid:CNVD-2021-80267
db:VULHUBid:VHN-393009
db:VULMONid:CVE-2021-33023
db:JVNDBid:JVNDB-2021-013714
db:CNNVDid:CNNVD-202110-897
db:NVDid:CVE-2021-33023

LAST UPDATE DATE

2024-08-14T14:03:02.818000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-258date:2022-02-02T00:00:00
db:ZDIid:ZDI-22-257date:2022-02-02T00:00:00
db:CNVDid:CNVD-2021-80267date:2022-01-18T00:00:00
db:VULHUBid:VHN-393009date:2021-10-20T00:00:00
db:VULMONid:CVE-2021-33023date:2021-10-20T00:00:00
db:JVNDBid:JVNDB-2021-013714date:2022-09-27T02:16:00
db:CNNVDid:CNNVD-202110-897date:2022-02-07T00:00:00
db:NVDid:CVE-2021-33023date:2021-10-20T22:16:01.683

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-258date:2022-02-02T00:00:00
db:ZDIid:ZDI-22-257date:2022-02-02T00:00:00
db:CNVDid:CNVD-2021-80267date:2021-10-26T00:00:00
db:VULHUBid:VHN-393009date:2021-10-18T00:00:00
db:VULMONid:CVE-2021-33023date:2021-10-18T00:00:00
db:JVNDBid:JVNDB-2021-013714date:2022-09-27T00:00:00
db:CNNVDid:CNNVD-202110-897date:2021-10-12T00:00:00
db:NVDid:CVE-2021-33023date:2021-10-18T13:15:09.437