Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files.
Advisories

No advisories yet.

Fixes

Solution

Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation .


Workaround

No workaround given by the vendor.

History

Thu, 18 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files.
Title Advantech WebAccess/SCADA Improper Limitation of a Pathname to a Restricted Directory
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-12-18T21:46:52.446Z

Reserved: 2025-12-17T18:59:18.176Z

Link: CVE-2025-14850

cve-icon Vulnrichment

Updated: 2025-12-18T21:03:24.736Z

cve-icon NVD

Status : Received

Published: 2025-12-18T21:15:52.900

Modified: 2025-12-18T21:15:52.900

Link: CVE-2025-14850

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses