Advantech WebAccess < 8.2_20161101 Multiple Vulnerabilities

critical Nessus Network Monitor Plugin ID 9961


The detected version of Advantech WebAccess may be affected by multiple attack vectors.


The installed version of Advantech WebAccess is prior to 8.2_20161101 and is affected by the following vulnerabilities :

- An unspecified flaw exists in the authentication mechanism. This may allow a remote attacker to bypass authentication and access restricted pages. (CVE-2017-5152)
- A flaw exists that may allow carrying out an SQL injection attack. The issue is due to the 'updateTemplate.aspx' script not properly sanitizing input to unspecified parameters. This may allow an authenticated, remote attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. (CVE-2017-5154)
- A flaw exists that is triggered when loading certain dynamic-link libraries. The program uses an insecure path to look for specific files or libraries that includes the current working directory, which may not be trusted or under user control. By placing a specially crafted library in the path, a local attacker can inject and execute arbitrary code with the privilege of the user running the program. (CVE-2017-5175)


Upgrade to Advantech WebAccess version 8.2_20161101 or later.

See Also

Plugin Details

Severity: Critical

ID: 9961

Family: SCADA

Published: 2/14/2017

Updated: 3/6/2019

Nessus ID: 96875

Risk Information


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:advantech:advantech_webaccess

Patch Publication Date: 11/1/2016

Vulnerability Publication Date: 1/12/2017

Reference Information

CVE: CVE-2017-5152, CVE-2017-5154, CVE-2017-5175

BID: 95410