ID

VAR-202308-1647


CVE

CVE-2023-1437


TITLE

Advantech  Made  WebAccess/SCADA  Untrusted Pointer Reference Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-002113

DESCRIPTION

All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files. Advantech Provided by WebAccess/SCADA is a browser-based SCADA It's a software package. WebAccess/SCADA The following vulnerabilities exist in. It was * unreliable pointer reference (CWE-822) - CVE-2023-1437If the vulnerability is exploited, it may be affected as follows

Trust: 1.71

sources: NVD: CVE-2023-1437 // JVNDB: JVNDB-2023-002113 // VULMON: CVE-2023-1437

AFFECTED PRODUCTS

vendor:advantechmodel:webaccess\/scadascope:ltversion:9.1.4

Trust: 1.0

vendor:アドバンテック株式会社model:webaccess/scadascope:eqversion: -

Trust: 0.8

vendor:アドバンテック株式会社model:webaccess/scadascope:ltversion:v9.1.4 earlier

Trust: 0.8

sources: JVNDB: JVNDB-2023-002113 // NVD: CVE-2023-1437

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-1437
value: CRITICAL

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2023-1437
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-1437
value: CRITICAL

Trust: 0.8

nvd@nist.gov: CVE-2023-1437
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2023-1437
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-002113 // NVD: CVE-2023-1437 // NVD: CVE-2023-1437

PROBLEMTYPE DATA

problemtype:CWE-822

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:unreliable pointer dereference (CWE-822) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-002113 // NVD: CVE-2023-1437

PATCH

title:WebAccess/SCADAurl:https://www.advantech.com/en/support/details/installation?id=1-MS9MJV

Trust: 0.8

sources: JVNDB: JVNDB-2023-002113

EXTERNAL IDS

db:NVDid:CVE-2023-1437

Trust: 2.7

db:ICS CERTid:ICSA-23-166-02

Trust: 1.9

db:JVNid:JVNVU91768920

Trust: 0.8

db:JVNDBid:JVNDB-2023-002113

Trust: 0.8

db:VULMONid:CVE-2023-1437

Trust: 0.1

sources: VULMON: CVE-2023-1437 // JVNDB: JVNDB-2023-002113 // NVD: CVE-2023-1437

REFERENCES

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-02

Trust: 1.9

url:http://jvn.jp/vu/jvnvu91768920/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-1437

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/822.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-1437 // JVNDB: JVNDB-2023-002113 // NVD: CVE-2023-1437

SOURCES

db:VULMONid:CVE-2023-1437
db:JVNDBid:JVNDB-2023-002113
db:NVDid:CVE-2023-1437

LAST UPDATE DATE

2024-08-14T15:31:57.736000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-1437date:2023-08-03T00:00:00
db:JVNDBid:JVNDB-2023-002113date:2024-04-08T08:36:00
db:NVDid:CVE-2023-1437date:2024-02-01T00:57:56.540

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-1437date:2023-08-02T00:00:00
db:JVNDBid:JVNDB-2023-002113date:2023-06-19T00:00:00
db:NVDid:CVE-2023-1437date:2023-08-02T23:15:10.153