This vulnerability allows remote attackers to create arbitrary files on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of calls to the exportPSInventoryTable method of the PSTable class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create files in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech iView |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-10989 is considered a high severity vulnerability due to its ability to allow remote attackers to create arbitrary files.
To fix ZDI-CAN-10989, ensure that your Advantech iView software is updated to the latest version that addresses this vulnerability.
The impact of ZDI-CAN-10989 is that it allows attackers to execute arbitrary file creation without requiring authentication.
ZDI-CAN-10989 affects all affected installations of Advantech iView where the vulnerability exists.
No, authentication is not required to exploit ZDI-CAN-10989, making it more dangerous.