Advantech WebAccess < 7.2-2013.11.14 Multiple Vulnerabilities

high Nessus Plugin ID 85411


The remote host is affected by multiple vulnerabilities.


The remote host has a version of Advantech WebAccess prior to version 7.2-2013.11.14. It is, therefore, affected by multiple vulnerabilities :

- Multiple SQL Injection vulnerabilities exist in 'DBVisitor.dll' that can be exploited via specially crafted SOAP requests. (CVE-2014-0763)

- Multiple stack-based buffer overflow conditions exist in an ActiveX control. (CVE-2014-0764, CVE-2014-0765, CVE-2014-0766, CVE-2014-0767, CVE-2014-0768)

- The 'NodeName' parameter on the web interface is affected by a buffer overflow vulnerability.

- A flawed ActiveX control allows attackers to read arbitrary files. (CVE-2014-0771, CVE-2014-0772)

- A flawed ActiveX control allows certain executable names to be run from arbitrary path names.


Upgrade to Advantech WebAccess version 7.2-2013.11.14 or higher.

Plugin Details

Severity: High

ID: 85411

File Name: scada_advantech_webaccess_7_2_2013_11_14.nbin

Version: 1.93

Type: remote

Family: SCADA

Published: 8/17/2015

Updated: 8/2/2022

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:advantech:webaccess

Required KB Items: www/scada_advantech_webaccess

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/3/2014

Vulnerability Publication Date: 4/8/2014

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0763, CVE-2014-0764, CVE-2014-0765, CVE-2014-0766, CVE-2014-0767, CVE-2014-0768, CVE-2014-0770, CVE-2014-0771, CVE-2014-0772, CVE-2014-0773

BID: 66718, 66722, 66725, 66728, 66732, 66733, 66740, 66742, 66749, 66750

ICSA: 14-079-03