If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server.
No analysis available yet.
Vendor Solution
Advantech released a new version V9.1.4 https://www.advantech.com/en/support/details/installation to address the problem by not including these files.
Vendor Workaround
Advantech recommends users locate and delete the “WADashboardSetup.msi” file to avoid this issue. If users wish to remedy this problem in version 8.4.5, they can uninstall "WebAccess Dashboard" from the control panel. Delete all the files: \Inetpub\wwwroot\broadweb\WADashboard \WebAccess\Node\WADashboardSetup.msi
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34314 | If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server. |
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:32:10.686Z
Reserved: 2023-05-24T14:09:39.667Z
Link: CVE-2023-2866
Updated: 2024-08-02T06:33:06.094Z
Status : Modified
Published: 2023-06-07T21:15:13.277
Modified: 2024-11-21T07:59:27.240
Link: CVE-2023-2866
No data.
OpenCVE Enrichment
No data.
EUVD