Advantech / BroadWin WebAccess webvrpcs.exe Service Remote Code Execution (credentialed check)

Critical Nessus Plugin ID 56994


The remote host is running a service that is affected by remote code execution and information disclosure vulnerabilities.


The Advantech WebAccess software installed on the remote Windows host includes an RPC service (webvrpcs.exe) that listens remotely on TCP port 4592. It is affected by two vulnerabilities :

- An overflow condition exists due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary code.

- An information disclosure vulnerability exists that allows an unauthenticated, remote attacker to obtain the security code value that protects the SCADA node via a long string in an RPC request to TCP port 4592.


Upgrade to Advantech WebAccess 7.1 2013.05.30 or later.

See Also

Plugin Details

Severity: Critical

ID: 56994

File Name: scada_advantech_webaccess_rce_local.nbin

Version: $Revision: 1.87 $

Type: local

Family: SCADA

Published: 2011/12/02

Modified: 2018/06/06

Dependencies: 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:advantech:webaccess, cpe:/a:broadwin:webaccess

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/08/01

Vulnerability Publication Date: 2011/03/22

Reference Information

CVE: CVE-2011-4041

BID: 47008

ICSA: 11-094-02B