This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DeviceTreeTable class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech iView |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-10672 is considered high due to its potential for unauthorized information disclosure.
To fix ZDI-CAN-10672, it is recommended to apply the latest security updates from Advantech for iView.
No, ZDI-CAN-10672 does not require authentication to exploit, making it particularly dangerous.
ZDI-CAN-10672 could potentially disclose sensitive information regarding the configuration and status of devices managed by iView.
ZDI-CAN-10672 affects various versions of Advantech iView that have not been patched against this vulnerability.