CWE
787 119
Advisory Published
Updated
Advisory Published

CVE-2019-10991: Advantech WebAccess Client bwclient Stack-based Buffer Overflow Remote Code Execution Vulnerability

First published: Fri Jun 28 2019(Updated: )

In WebAccess/SCADA, Versions 8.3.5 and prior, multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Advantech WebAccess<=8.3.5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-10991 vulnerability?

    CVE-2019-10991 is a stack-based buffer overflow vulnerability in the Advantech WebAccess Client, which allows remote attackers to execute arbitrary code on affected installations without authentication.

  • How severe is the CVE-2019-10991 vulnerability?

    The severity level of CVE-2019-10991 vulnerability is critical with a CVSS score of 9.8.

  • What is the affected software for CVE-2019-10991 vulnerability?

    The affected software for CVE-2019-10991 vulnerability is Advantech WebAccess with version up to and including 8.3.5.

  • How can remote attackers exploit the CVE-2019-10991 vulnerability?

    Remote attackers can exploit the CVE-2019-10991 vulnerability by sending malicious input to the bwclient.exe component via the 0x2711 IOCTL in the webvrpcs process.

  • Are there any references for CVE-2019-10991 vulnerability?

    Yes, you can find references for CVE-2019-10991 vulnerability at the following links: - https://www.us-cert.gov/ics/advisories/icsa-19-178-05 - https://www.zerodayinitiative.com/advisories/ZDI-19-586/ - https://www.zerodayinitiative.com/advisories/ZDI-19-588/

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203