First published: Wed Jun 12 2024(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ConfigurationServlet servlet, which listens on TCP port 8080 by default. When parsing the column_value element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech iView |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-24-610 is classified as a critical vulnerability due to its potential for remote exploitation without authentication.
To mitigate ZDI-24-610, ensure that your Advantech iView instance is updated to the latest version as recommended by the vendor.
ZDI-24-610 affects installations of Advantech iView that have the ConfigurationServlet servlet running on TCP port 8080.
Exploitation of ZDI-24-610 can lead to the disclosure of sensitive information from affected Advantech iView installations.
No, authentication is not required to exploit ZDI-24-610, making it critical for affected users to take immediate action.