• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Coinminer Bundled with Zoom Installer
April 7, 2020
Rewterz Threat Advisory – ICS: B&R Automation Studio Multiple Vulnerabilities
April 8, 2020

Rewterz Threat Advisory – ICS: Advantech WebAccess/NMS Multiple Vulnerabilities

April 8, 2020

Severity

High

Analysis Summary

CVE-2020-10621

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product’s environment.

CVE-2020-10617

The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE-2020-10623

Multiple vulnerabilities could allow an attacker with low privileges to perform SQL injection to gain access to sensitive information.

CVE-2020-10631 

An attacker could use a specially crafted URL to delete or read files outside the application’s control.

CVE-2020-10625 

The application allows an unauthenticated remote user to create a new admin account.

CVE-2020-10629

The application does not sanitize XML input. Specially crafted XML input could allow an attacker to read sensitive files.

CVE-2020-10603 

The application does not properly sanitize user input and may allow an attacker to inject system commands remotely.

Impact

  • Gain access to sensitive information
  • SQL Injection
  • Missing Authentication for Critical Function
  • OS Command Injection

Affected Vendors

Advantech

Affected Products

WebAccess/NMS versions prior to 3.0.2

Remediation

Advantech recommends updating to Version 3.0.2

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.