First published: Wed Jul 15 2020(Updated: )
Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (“command injection”) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that creates a command string without any validation. The attacker may then remotely execute code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech iView | <=5.6 | |
Advantech iView | ||
Advantech iView Versions 5.6 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14505 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Advantech iView.
No, authentication is not required to exploit this vulnerability.
The severity of CVE-2020-14505 is critical with a CVSS score of 9.8.
CVE-2020-14505 works by exploiting a command injection vulnerability in the restoreDatabase method of the NetworkServlet class in Advantech iView.
To fix CVE-2020-14505, it is recommended to apply the latest security patches provided by Advantech.