CVE-2017-5154

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

An issue was discovered in Advantech WebAccess Version 8.1. To be able to exploit the SQL injection vulnerability, an attacker must supply malformed input to the WebAccess software. Successful attack could result in administrative access to the application and its data files.

References

http://www.securityfocus.com/bid/95410

https://ics-cert.us-cert.gov/advisories/ICSA-17-012-01

https://www.tenable.com/security/research/tra-2017-04

Details

Source: MITRE

Published: 2017-02-13

Updated: 2017-11-03

Type: CWE-89

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:advantech:webaccess:8.1:*:*:*:*:*:*:*

Tenable Plugins

View all (2 total)

IDNameProductFamilySeverity
9961Advantech WebAccess < 8.2_20161101 Multiple VulnerabilitiesNessus Network MonitorSCADA
critical
96876Advantech WebAccess SQLiNessusSCADA
critical