Skip to content
  Thursday 22 May 2025
Trending
May 10, 2025Cybersecurity Analyst January 5, 20225 Best Android Emulators for Mac 2022 – Android App on Mac January 12, 2024New Attacks Exploit Misconfigured Apache Hadoop and Flink to Infect with Rootkit by Cryptominers May 19, 2025The impact of climate change on the world’s oceans is becoming increasingly evident, with rising sea levels, ocean acidification, and warming waters all posing significant threats to marine ecosystems. In recent years, scientists have observed a dramatic increase in the frequency and intensity of extreme weather events such as hurricanes, typhoons, and cyclones, which can have devastating effects on coastal communities and marine life.<br /> <br /> One of the most concerning consequences of climate change is the bleaching of coral reefs, which occurs when rising water temperatures cause the symbiotic algae that live within corals to be expelled. This loss of algae deprives the corals of their main source of food and energy, leading to widespread coral death and a decline in biodiversity. As coral reefs provide essential habitat for a quarter of all marine species, their loss could have far-reaching implications for the health of ocean ecosystems.<br /> <br /> Another major issue facing the world’s oceans is plastic pollution, which is estimated to be responsible for the deaths of over a million seabirds and 100,000 marine mammals each year. Plastic waste can entangle marine animals, block their digestive systems, and release harmful chemicals into the water, poisoning marine life and disrupting food chains. Efforts to reduce plastic pollution, such as bans on single-use plastics and clean-up initiatives, are crucial in protecting our oceans from further harm.<br /> <br /> In addition to the direct impacts of climate change and pollution, overfishing and destructive fishing practices are putting immense pressure on marine populations. Unsustainable fishing practices, such as bottom trawling and bycatch, are depleting fish stocks and damaging fragile marine habitats. Conservation measures, such as marine protected areas and sustainable fishing quotas, are essential in ensuring the long-term health and productivity of our oceans.<br /> <br /> Ultimately, the health of the world’s oceans is intrinsically linked to the health of our planet as a whole. By taking action to address the root causes of climate change, reduce pollution, and promote sustainable fishing practices, we can help to safeguard the future of our oceans and protect the incredible diversity of life they support. It is imperative that we work together to preserve and protect our oceans for future generations to come. February 21, 2025<h3>One Year On: The Aftermath of Change Healthcare’s Mega Attack</h3> February 11, 2025<h3>Harness and Traceable Unite to Revolutionize DevSecOps Integration</h3> January 19, 2024NPM Trojan Evades UAC and Deploys AnyDesk through ‘Oscompatible’ Package March 14, 2025Enterprise Account Executive – Cybersecurity (Georgia) November 4, 2024CISA Adds Two Known Exploited Vulnerabilities to Catalog August 15, 2024Siemens INTRALOG WMS | CISA
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  Advantech WebAccess/SCADA | CISA
Threat Advisories

Advantech WebAccess/SCADA | CISA

Mister CybersecurityMister Cybersecurity—June 1, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


1. EXECUTIVE SUMMARY

  • CVSS v3 7.2 
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Advantech
  • Equipment: WebAccess Node
  • Vulnerabilities: Improper Control of Generation of Code (‘Code Injection’), Unrestricted Upload of File with Dangerous Type

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to arbitrarily overwrite files resulting in remote code execution.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Advantech products are affected:

  • WebAccess/SCADA versions 9.1.3 and prior

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER CONTROL OF GENERATION OF CODE (‘CODE INJECTION’) CWE-94

In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution.

CVE-2023-32540 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

3.2.2 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434

In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution.

More stories

Siemens SiPass integrated AC5102/ACC-G2 and ACC-AP

March 14, 2025

CISA Releases One Industrial Control Systems Advisory

June 27, 2023

FBI, CISA, and MS-ISAC Release #StopRansomware: LockBit 3.0

March 17, 2023

Yokogawa CENTUM | CISA

June 20, 2024

CVE-2023-22450 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

3.2.3 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434

In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution.

CVE-2023-32628 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing, Energy, Water and Wastewater Systems
  • COUNTRIES/AREAS DEPLOYED: East Asia, Europe, United States
  • COMPANY HEADQUARTERS LOCATION: Tawain

3.4 RESEARCHER

YangLiu from Elex Feigong Research Institute reported these vulnerabilities to CISA.

4. MITIGATIONS

Advantech recommends WebAccess/SCADA users upgrade to v9.1.4. 

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:

  • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls and isolate them from business networks.
  • When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

HID Global SAFE | CISA
CISA Releases Five Industrial Control Systems Advisories
Related posts
  • Related posts
  • More from author
Threat Advisories

New Best Practices Guide for Securing AI Data Released

May 22, 20250
Threat Advisories

Threat Actors Target U.S. Critical Infrastructure with LummaC2 Malware

May 21, 20250
Threat Advisories

Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations

May 21, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

New Best Practices Guide for Securing AI Data Released

May 22, 20250
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Careers

Cybersecurity Engineer III – Application Security

May 22, 20250
Careers

Cybersecurity Engineer

May 22, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • New Best Practices Guide for Securing AI Data Released
  • Cybersecurity Engineer (Top Secret Clearance Required)
  • Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)
  • Cybersecurity Architect
  • Cybersecurity Engineer III – Application Security

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures