Several serious vulnerabilities have been patched by Taiwan-based industrial automation company Advantech in its WebAccess SCADA software.
Advantech WebAccess is a browser-based software package for human-machine interfaces (HMI) and supervisory control and data acquisition (SCADA) systems. The product has been used mainly in the United States, Europe and East Asia, in sectors such as critical manufacturing, energy, and water and wastewater.
According to an advisory published this week by ICS-CERT, researchers discovered that WebAccess is affected by three types of vulnerabilities, including two remote code execution flaws rated “critical” and one denial-of-service (DoS) bug classified as “high severity.”
Learn More About ICS Flaws at SecurityWeek’s 2019 ICS Cyber Security Conference
The security holes were reported by researchers to Advantech through Trend Micro’s Zero Day Initiative (ZDI). The company has published two dozen advisories describing each variation of the three vulnerabilities.
According to ZDI, the code execution flaws, tracked as CVE-2019-6552 and CVE-2019-6550, can be exploited by an unauthenticated attacker to execute arbitrary code with administrator privileges. The vulnerabilities exist in different executable files, but they all appear to be related to the same resource in the webvrpcs process.
“The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer,” ZDI’s advisories explain.
As for the DoS flaw, identified as CVE-2019-6554, it affects a file named UninstallWA.exe and the same webvrpcs process. An unauthenticated attacker can exploit the weakness to uninstall the application and create a DoS condition on the system.
The vulnerabilities were reported to Advantech in January and ICS-CERT says they were patched with the release of version 8.4.0 of WebAccess.
Related: Critical Code Execution Flaws Patched in Advantech WebAccess
Related: Several Vulnerabilities Patched in Advantech WebAccess
Related: Advantech WebAccess Flaws Allow Access to Sensitive Data
Related: Advantech Failed to Patch Serious Flaws in SCADA Product

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
