Advantech WebAccess Authentication Bypass

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote host is running a web application that is affected by an
authentication bypass vulnerability.

Description :

The Advantech WebAccess web server running on the remote host is
affected by an authentication bypass vulnerability in the WaExlViewer
component due to a failure to properly manage authentication. An
unauthenticated, remote attacker can exploit this, via a POST request
with specially crafted parameters, to bypass intended restrictions,
allowing the attacker to access restricted pages, upload template
files, and delete existing templates.

See also :

https://www.tenable.com/security/research/tra-2017-04
https://ics-cert.us-cert.gov/advisories/ICSA-17-012-01
http://www.zerodayinitiative.com/advisories/ZDI-17-043/

Solution :

Contact the vendor for a solution.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: SCADA

Nessus Plugin ID: 96875 ()

Bugtraq ID: 95410

CVE ID: CVE-2017-5152

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now