This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WISE-PaaS/RMM. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NodeRed Server, which listens on TCP port 1880 by default. The issue results from the lack of authentication prior to allowing alterations to the system configuration. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WISE-PaaS/RMM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-19-960 has been assigned a high severity level due to its potential for remote code execution without authentication.
To fix ZDI-19-960, ensure you update Advantech WISE-PaaS/RMM to the latest version provided by the vendor.
ZDI-19-960 affects installations of Advantech WISE-PaaS/RMM that are running the vulnerable version of the NodeRed Server.
Yes, ZDI-19-960 can be exploited by remote attackers without the need for authentication.
The specific component involved in ZDI-19-960 is the NodeRed Server, which listens on TCP port 1880 by default.