First published: Tue May 15 2018(Updated: )
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a path transversal vulnerability has been identified, which may allow an attacker to disclose sensitive information on the target.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WebOP | <=8.2_20170817 | |
Advantech WebOP | <=8.3.0 | |
Advantech WebAccess Dashboard | <=2.0.15 | |
Advantech WebAccess/SCADA | <8.3.1 | |
Advantech WebAccess/NMS | <=2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7503 is classified as a high severity vulnerability due to the potential for unauthorized access to sensitive files and data through path traversal attacks.
To fix CVE-2018-7503, upgrade to Advantech WebAccess versions V8.3.1 or later, WebAccess Dashboard versions V2.0.16 or later, and WebAccess/NMS version 2.0.4 or later.
CVE-2018-7503 is a path traversal vulnerability that allows attackers to gain access to restricted files within the affected software.
CVE-2018-7503 affects Advantech WebAccess, WebAccess Dashboard, WebAccess Scada Node, and WebAccess/NMS versions listed prior to specified thresholds.
An attacker can exploit CVE-2018-7503 by manipulating URL paths to access sensitive files outside of the intended directories in the affected software.