This vulnerability allows remote attackers to create arbitrary files on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of calls to the exportPSInventoryTable method of the PSTable class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create files in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech iView |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-1086 is critical due to its ability to allow remote attackers to create arbitrary files without authentication.
To fix ZDI-20-1086, apply patches provided by Advantech for the iView software as soon as they become available.
Exploiting ZDI-20-1086 enables remote attackers to create arbitrary files on affected systems, potentially leading to further compromise.
No, authentication is not required to exploit the ZDI-20-1086 vulnerability.
ZDI-20-1086 affects installations of Advantech iView, but specific vulnerable versions should be identified in the vendor's advisories.