Advantech WebAccess < 8.0.2015.08.16 Unspecified DLL String Handling Arbitrary Code Execution

medium Nessus Plugin ID 86899


The remote host has a web application running that is affected by an arbitrary code execution vulnerability.


The Advantech WebAccess application running on the remote host is prior to version 8.0.2015.08.16. It is, therefore, affected by an arbitrary code execution vulnerability due to improper validation of user-supplied input when handling an unspecified DLL string in a file.
A local attacker can exploit this, via a specially crafted application, to cause a stack-based buffer overflow, resulting in the execution of arbitrary code or a denial of service condition.


Upgrade to Advantech WebAccess version 8.0.2015.08.16 or later.

See Also

Plugin Details

Severity: Medium

ID: 86899

File Name: scada_advantech_webaccess_8_2015_0816.nbin

Version: 1.109

Type: remote

Family: SCADA

Published: 11/17/2015

Updated: 7/17/2023

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:advantech:webaccess

Required KB Items: www/scada_advantech_webaccess

Exploit Ease: No known exploits are available

Patch Publication Date: 9/15/2015

Vulnerability Publication Date: 9/15/2015

Reference Information

CVE: CVE-2014-9202

BID: 76753

ICSA: 15-258-04