Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to determine the existence of arbitrary files.
Advisories

No advisories yet.

Fixes

Solution

Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation .


Workaround

No workaround given by the vendor.

History

Thu, 18 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to determine the existence of arbitrary files.
Title Advantech WebAccess/SCADA Path Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-12-18T21:46:25.952Z

Reserved: 2025-12-09T20:16:53.210Z

Link: CVE-2025-67653

cve-icon Vulnrichment

Updated: 2025-12-18T21:01:23.233Z

cve-icon NVD

Status : Received

Published: 2025-12-18T21:15:57.807

Modified: 2025-12-18T21:15:57.807

Link: CVE-2025-67653

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses