First published: Fri Jun 28 2019(Updated: )
In WebAccess/SCADA Versions 8.3.5 and prior, multiple heap-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. Note: A different vulnerability than CVE-2019-10991.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WebAccess | <=8.3.5 | |
Advantech WebAccess |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-10989 is critical with a CVSS score of 9.8.
CVE-2019-10989 allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Node without requiring authentication.
The specific flaw in CVE-2019-10989 exists within the implementation of the 0x113d1 IOCTL in the webvrpcs process, resulting in a heap-based buffer overflow.
Versions of Advantech WebAccess up to and including 8.3.5 are affected by CVE-2019-10989.
To fix CVE-2019-10989, users should update to a version of Advantech WebAccess that is not vulnerable or apply the necessary security patches.