If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34314 | If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server. |
Solution
Advantech released a new version V9.1.4 https://www.advantech.com/en/support/details/installation to address the problem by not including these files.
Workaround
Advantech recommends users locate and delete the “WADashboardSetup.msi” file to avoid this issue. If users wish to remedy this problem in version 8.4.5, they can uninstall "WebAccess Dashboard" from the control panel. Delete all the files: \Inetpub\wwwroot\broadweb\WADashboard \WebAccess\Node\WADashboardSetup.msi
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:32:10.686Z
Reserved: 2023-05-24T14:09:39.667Z
Link: CVE-2023-2866
Updated: 2024-08-02T06:33:06.094Z
Status : Modified
Published: 2023-06-07T21:15:13.277
Modified: 2024-11-21T07:59:27.240
Link: CVE-2023-2866
No data.
OpenCVE Enrichment
No data.
EUVD