Advantech WebAccess < 8.0.2015.08.16 Unspecified DLL String Handling Arbitrary Code Execution

Medium Nessus Plugin ID 86899


The remote host has a web application running that is affected by an arbitrary code execution vulnerability.


The Advantech WebAccess application running on the remote host is prior to version 8.0.2015.08.16. It is, therefore, affected by an arbitrary code execution vulnerability due to improper validation of user-supplied input when handling an unspecified DLL string in a file.
A local attacker can exploit this, via a specially crafted application, to cause a stack-based buffer overflow, resulting in the execution of arbitrary code or a denial of service condition.


Upgrade to Advantech WebAccess version 8.0.2015.08.16 or later.

See Also

Plugin Details

Severity: Medium

ID: 86899

File Name: scada_advantech_webaccess_8_2015_0816.nbin

Version: $Revision: 1.26 $

Type: remote

Family: SCADA

Published: 2015/11/17

Modified: 2018/04/18

Dependencies: 73645

Risk Information

Risk Factor: Medium


Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:advantech:webaccess

Required KB Items: www/scada_advantech_webaccess

Patch Publication Date: 2015/09/15

Vulnerability Publication Date: 2015/09/15

Reference Information

CVE: CVE-2014-9202

BID: 76753

OSVDB: 127534

ICSA: 15-258-04