This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetworkServlet servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech iView |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-830 is classified as critical due to the potential for remote information disclosure without authentication.
To fix ZDI-20-830, apply the latest security patches provided by Advantech for iView to mitigate the vulnerability.
ZDI-20-830 allows attackers to disclose sensitive information such as configuration details and user data stored within the iView application.
No, authentication is not required to exploit ZDI-20-830, making it more critical for affected installations.
ZDI-20-830 affects specific installations of Advantech iView, particularly those that have not been updated to address the vulnerability.