Advantech iView runProViewUpgrade fwfilename Command Injection (CVE-2022-2143)

critical Nessus Plugin ID 164195

Synopsis

A web application is affected by a command injection vulnerability.

Description

The Advantech iView running on the remote host is affected by a command injection vulnerability. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to execute arbitrary code in the context of SYSTEM.

Solution

Upgrade Advantech iView to version 5.7.04.6469 or later.

See Also

https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-03

Plugin Details

Severity: Critical

ID: 164195

File Name: scada_advantech_iview_cve-2022-2143.nbin

Version: 1.31

Type: remote

Family: SCADA

Published: 8/17/2022

Updated: 4/23/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-2143

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:advantech:iview

Required KB Items: installed_sw/Advantech iView

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 6/28/2022

Vulnerability Publication Date: 6/28/2022

Exploitable With

Metasploit (Advantech iView NetworkServlet Command Injection)

Reference Information

CVE: CVE-2022-2143

ICSA: 22-179-03

ZDI: ZDI-22-936