Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.0123 Advantech WebAccess Vulnerabilities 18 January 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Advantech WebAccess Publisher: US-CERT Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Access Privileged Data -- Remote/Unauthenticated Create Arbitrary Files -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Cross-site Request Forgery -- Remote with User Interaction Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2016-0860 CVE-2016-0859 CVE-2016-0858 CVE-2016-0857 CVE-2016-0856 CVE-2016-0855 CVE-2016-0854 CVE-2016-0853 CVE-2016-0852 CVE-2016-0851 CVE-2015-6467 CVE-2015-3948 CVE-2015-3947 CVE-2015-3946 CVE-2015-3943 Original Bulletin: https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01 - --------------------------BEGIN INCLUDED TEXT-------------------- Advisory (ICSA-16-014-01) Advantech WebAccess Vulnerabilities Original release date: January 14, 2016 Print Document Legal Notice All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/. OVERVIEW Ilya Karpov of Positive Technologies, Ivan Sanchez, Andrea Micalizzi, Ariele Caltabiano, Fritz Sands, Steven Seeley, and an anonymous researcher have identified multiple vulnerabilities in Advantech WebAccess application. Many of these vulnerabilities were reported through the Zero Day Initiative (ZDI) and iDefense. Advantech has produced a new version to mitigate these vulnerabilities. Ivan Sanchez has tested the new version to validate that it resolves the vulnerabilities which he reported. These vulnerabilities could be exploited remotely. AFFECTED PRODUCTS Advantech reports that the vulnerabilities affect the following versions of WebAccess: WebAccess Version 8.0 and prior versions. IMPACT An attacker who exploits these vulnerabilities may be able to upload, create, or delete arbitrary files on the target system, deny access to valid users, or remotely execute arbitrary code. Impact to individual organizations depends on many factors that are unique to each organization. NCCIC/ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. BACKGROUND Advantech is based in Taiwan and has distribution offices in 21 countries worldwide. The affected product, WebAccess, formerly known as BroadWin WebAccess, is a web-based SCADA and human-machine interface (HMI) product. According to Advantech, WebAccess is deployed across several sectors including Commercial Facilities, Critical Manufacturing, Energy, and Government Facilities. Advantech estimates that these products are used globally. VULNERABILITY CHARACTERIZATION VULNERABILITY OVERVIEW ACCESS OF MEMORY LOCATION AFTER END OF BUFFER [a] The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. CVE-2016-0851 [b] has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). [c] UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE [d] An attacker can upload or create arbitrary files on the server without authentication or constraint. CVE-2016-0854 [e] has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [f] PATH TRAVERSAL [g] The virtual directory created by WebAccess can be browsed anonymously without authentication. CVE-2016-0855 [h] has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [i] STACK-BASED BUFFER OVERFLOW [j] There are many instances where the buffer on the stack can be overwritten. CVE-2016-0856 [k] has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [l] HEAP-BASED BUFFER OVERFLOW [m] There are many conditions in which more space than what is allocated can be written to the heap. CVE-2016-0857 [n] has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [o] RACE CONDITION [p] A specially crafted request can cause a buffer overflow in a shared virtual memory area. CVE-2016-0858 [q] has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [r] INTEGER OVERFLOW TO BUFFER OVERFLOW [s] An attacker can send a crafted RPC request to the Kernel service to cause a stack-based buffer overflow. CVE-2016-0859 [t] has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [u] IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER [v] An attacker can send a crafted RPC request to the BwpAlarm subsystem to cause a buffer overflow on global variables. CVE-2016-0860 [w] has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). [x] IMPROPER ACCESS CONTROL [y] Normal and remote users have access to files and folders that only administrators should be allowed to access. CVE-2016-0852 [z] has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). [aa] IMPROPER INPUT VALIDATION [bb] Input validation vulnerabilities could allow an attacker to gain sensitive information from the target system. CVE-2016-0853 [cc] has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). [dd] CROSS-SITE SCRIPTING [ee] The web server does not filter user input correctly, allowing a malicious user to initiate a cross-site scripting vulnerability. CVE-2015-3948 [ff] has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been assigned; the CVSS vector string is (AV:N/AC:M/Au:S/C:N/I:P/A:N). [gg] SQL INJECTION [hh] Web server settings, accounts, and projects may be modified through scripted commands. CVE-2015-3947 [ii] has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:S/C:C/I:C/A:N). [jj] CROSS-SITE REQUEST FORGERY [kk] The web server accepts commands via specific scripts that imitate trusted accounts. CVE-2015-3946 [ll] has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been assigned; the CVSS vector string is (AV:N/AC:H/Au:N/C:P/I:P/A:P). [mm] EXTERNAL CONTROL OF FILE NAME OR PATH [nn] WebAccess can be made to run remote code through the use of a browser plug-in. CVE-2015-6467 [oo] has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:M/Au:N/C:C/I:C/A:C). [pp] CLEARTEXT STORAGE OF SENSITIVE INFORMATION [qq] Email project accounts are stored in clear text. CVE-2015-3943 [rr] has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:A/AC:L/Au:N/C:C/I:N/A:N). [ss] VULNERABILITY DETAILS EXPLOITABILITY These vulnerabilities could be exploited remotely. EXISTENCE OF EXPLOIT No known public exploits specifically target these vulnerabilities. DIFFICULTY An attacker with a low skill would be able to exploit these vulnerabilities. MITIGATION Advantech has released a new version of WebAccess, Version 8.1, to address the reported vulnerabilities. This new version is available on the Advantech website at the following location: http://www.advantech.com/industrial-automation/webaccess (link is external) ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems and ensure that they are not accessible from the Internet Locate control system networks and remote devices behind firewalls and isolate them from the business network. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page athttp://ics-cert.us-cert.gov/content/recommended-practices. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. Additional mitigation guidance and recommended practices are publicly available in the ICSCERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site (http://ics-cert.us-cert.gov/). Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents. a. CWE-788: Access of Memory Location After End of Buffer, http://cwe.mitre.org/data/definitions/788.html, web site last accessed January 14, 2016. b. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0851, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. c. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. d. CWE-434: Unrestricted Upload of File with Dangerous Type, http://cwe.mitre.org/data/definitions/434.html, web site last accessed January 14, 2016. e. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0854, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. f. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. g. CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), http://cwe.mitre.org/data/definitions/22.html, web site last accessed January 14, 2016. h. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0855, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. i. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. j. CWE-121: Stack-based Buffer Overflow, http://cwe.mitre.org/data/definitions/121.html, web site last accessed January 14, 2016. k. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0856, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. l. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. m. CWE-122: Heap-based Buffer Overflow, http://cwe.mitre.org/data/definitions/122.html, web site last accessed January 14, 2016. n. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0857, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. o. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. p. CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'), http://cwe.mitre.org/data/definitions/362.html, web site last accessed January 14, 2016. q. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0858, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. r. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. s. CWE-680: Integer Overflow to Buffer Overflow, http://cwe.mitre.org/data/definitions/680.html, web site last accessed January 14, 2016. t. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0859, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. u. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. v. CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer, http://cwe.mitre.org/data/definitions/119.html, web site last accessed January 14, 2016. w. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0860, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. x. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. y. CWE-284: Improper Access Control, http://cwe.mitre.org/data/definitions/284.html, web site last accessed January 14, 2016. z. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0852, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. aa. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S... , web site last accessed January 14, 2016. bb. CWE-20: Improper Input Validation, http://cwe.mitre.org/data/definitions/20.html, web site last accessed January 14, 2016. cc. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0853, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. dd. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. ee. CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), http://cwe.mitre.org/data/definitions/79.html, web site last accessed January 14, 2016. ff. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3948 , NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. gg. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S..., web site last accessed January 14, 2016. hh. CWE-89: SQL Injection, http://cwe.mitre.org/data/definitions/89.html, web site last accessed January 14, 2016. ii. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3947, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. jj. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S..., web site last accessed January 14, 2016. kk. CWE-352: Cross-Site Request Forgery, http://cwe.mitre.org/data/definitions/352.html, web site last accessed January 14, 2016. ll. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3946, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. mm. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S..., web site last accessed January 14, 2016. nn. CWE-73: External Control of File Name or Path, http://cwe.mitre.org/data/definitions/73.html, web site last accessed January 14, 2016. oo. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6467 , NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. pp. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S..., web site last accessed January 14, 2016. qq. CWE-312: Cleartext Storage of Sensitive Information, http://cwe.mitre.org/data/definitions/312.html, web site last accessed January 14, 2016. rr. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3943, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. ss. CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S..., web site last accessed January 14, 2016. Contact Information For any questions related to this report, please contact ICS-CERT at: Email: ics-cert@hq.dhs.gov (link sends e-mail) Toll Free: 1-877-776-7585 International Callers: (208) 526-0900 For industrial control systems security information and incident reporting: http://ics-cert.us-cert.gov ICS-CERT continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVpxCtH6ZAP0PgtI9AQIisw//S0znzz9aDvMwDS/9VWl2yENFcu2/La/F FCO1eKmnm+tPGDSnz34UvzfaPNNVayyPtw6qGdtrwhPKu0pxJG/nxHA9hBN26DYi jrOYX9ftCIxniASzRnQ2xr4KUryAM/jafp41oFf25kPvRVW+SuFadOVyvYBHO++z 252P0B1OK3dBPluQ4PLbR2qRs29d+6e4bajydcE8UI5jO/xzy+D6ou3z4wjAC0ss cc2HMo2DGczL9pXH7yKVarVD9LISO1KCf5TOrq4gZS/k5HxWCYy6RvbwZ2ndCVuO DPOoClkVGvR9NOks0SWdfk0gxYf795VCKqz2RFye9IG6Q1vIjFZWSKpT458k70nO whwxFJKxW5TqqDYBBO4uNegGXVYOTW8Ao7v18T3b3CdVrUmeW+DN/dL7nK12zlqK PzPxsOxLOlfU/j8GUXr6ALTxJvtLDzH5USBTow4sARXxmP/u1nnA0cpQOuy5ODFd 21+EzD5vcqrqrGmEJOkhFMh56pnaguYNze5x8Em+nhtp5XWH10B0VsW3jJGD4JyH GST6QwBKqBFRTPiLBgV8MK5qCK4SPSYDN/27KM3UXp2tcGs2KWs2uK2SY1wbs8rg GUrjHT7jsSiad0rK178lZ4DsJaHI1bj1feTKvPvIdVN/tuWZvNYuwauXAwExBLaM BINOm8/kItE= =HHOV -----END PGP SIGNATURE-----