First published: Fri Jun 28 2019(Updated: )
In WebAccess/SCADA, Versions 8.3.5 and prior, multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WebAccess | <=8.3.5 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10991 is a stack-based buffer overflow vulnerability in the Advantech WebAccess Client, which allows remote attackers to execute arbitrary code on affected installations without authentication.
The severity level of CVE-2019-10991 vulnerability is critical with a CVSS score of 9.8.
The affected software for CVE-2019-10991 vulnerability is Advantech WebAccess with version up to and including 8.3.5.
Remote attackers can exploit the CVE-2019-10991 vulnerability by sending malicious input to the bwclient.exe component via the 0x2711 IOCTL in the webvrpcs process.
Yes, you can find references for CVE-2019-10991 vulnerability at the following links: - https://www.us-cert.gov/ics/advisories/icsa-19-178-05 - https://www.zerodayinitiative.com/advisories/ZDI-19-586/ - https://www.zerodayinitiative.com/advisories/ZDI-19-588/