First published: Wed Jun 07 2023(Updated: )
If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WebAccess | =8.4.5 | |
Advantech WebAccess/SCADA: version 8.4.5 |
Advantech released a new version V9.1.4 https://www.advantech.com/en/support/details/installation to address the problem by not including these files.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-2866.
CVE-2023-2866 has a severity rating of 7.8 (High).
Advantech WebAccess version 8.4.5 is affected by CVE-2023-2866.
An attacker can exploit CVE-2023-2866 by tricking an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5.
The potential impact of CVE-2023-2866 is that it allows the attacker to gain full control of the SCADA server using a web shell.