Virtual Event Today: Supply Chain Security Summit - Register Now

Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Advantech Failed to Patch Serious Flaws in SCADA Product

The Zero Day Initiative (ZDI) has published advisories describing several unpatched vulnerabilities affecting Advantech’s WebAccess industrial automation SCADA/HMI product.

The Zero Day Initiative (ZDI) has published advisories describing several unpatched vulnerabilities affecting Advantech’s WebAccess industrial automation SCADA/HMI product.

In mid-January, ICS-CERT published an advisory describing more than a dozen vulnerabilities identified by several researchers in Advantech WebAccess 8.0 and earlier.

Ilya Karpov, Ivan Sanchez, Andrea Micalizzi, Ariele Caltabiano, Fritz Sands, Steven Seeley, and an anonymous researcher have been credited for finding unrestricted file upload, path traversal, improper access control, cross-site scripting (XSS), SQL injection, insecure storage of information, and memory corruption vulnerabilities. The vendor released WebAccess 8.1 to address the flaws and Sanchez confirmed that the issues he reported were addressed properly.

However, advisories marked “0day” by ZDI show that some of the flaws haven’t been patched properly in WebAccess 8.1.

One of them is a medium severity local privilege escalation bug reported by Sands. While ICS-CERT’s advisory contains only limited details on each flaw, the improperly patched vulnerability could be CVE-2016-0852, described as an improper access control issue.

It also appears that a couple of high severity stack-based and heap-based buffer overflow vulnerabilities reported by an anonymous researcher, CVE-2016-0856 and CVE-2016-0857, were also not patched properly by Advantech. The vulnerabilities can be exploited by a remote, unauthenticated attacker to execute arbitrary code on the targeted system, ZDI said.

ZDI has published tens of advisories describing what appear to be different variants of these vulnerabilities, which haven’t been patched with the release of Advantech’s update.

ZDI said it disclosed the flaws despite not being fixed based on its “policy on lack of vendor response.”

Advantech has not responded to SecurityWeek’s request for comment by the time of publication.

It’s not uncommon for Advantech’s patches to fail to resolve and even introduce vulnerabilities. While analyzing one of the company’s firmware updates last year, Rapid7 researchers discovered the existence of several known vulnerabilities, including ShellShock and Heartbleed. Rapid7 discovered in January that changes made in the firmware version designed to address these issues introduced another serious authentication bypass vulnerability.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.

ICS/OT

More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...

ICS/OT

Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.

ICS/OT

White hat hackers received $180,000 at Pwn2Own Miami 2023 for exploits targeting widely used ICS products.