First published: Wed Aug 02 2023(Updated: )
All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent client could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech Webaccess\/scada | <9.1.4 | |
Advantech WebAccess/SCADA | <9.1.4 | 9.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1437 is a vulnerability in Advantech WebAccess/SCADA versions prior to 9.1.4 that allows an attacker to gain access to the remote file system and execute arbitrary code.
The severity of CVE-2023-1437 is critical with a CVSS score of 9.8.
Versions prior to 9.1.4 of Advantech WebAccess/SCADA are affected by CVE-2023-1437.
An attacker can exploit CVE-2023-1437 by sending RPC arguments with raw memory pointers to gain access to the remote file system and execute arbitrary code.
Yes, upgrading to version 9.1.4 of Advantech WebAccess/SCADA will mitigate the vulnerability.