-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0123
                    Advantech WebAccess Vulnerabilities
                              18 January 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Advantech WebAccess
Publisher:         US-CERT
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Create Arbitrary Files          -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Request Forgery      -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-0860 CVE-2016-0859 CVE-2016-0858
                   CVE-2016-0857 CVE-2016-0856 CVE-2016-0855
                   CVE-2016-0854 CVE-2016-0853 CVE-2016-0852
                   CVE-2016-0851 CVE-2015-6467 CVE-2015-3948
                   CVE-2015-3947 CVE-2015-3946 CVE-2015-3943

Original Bulletin: 
   https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory (ICSA-16-014-01)

Advantech WebAccess Vulnerabilities

Original release date: January 14, 2016

Print Document

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided
"as is" for informational purposes only. The Department of Homeland Security 
(DHS) does not provide any warranties of any kind regarding any information 
contained within. DHS does not endorse any commercial product or service, 
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For 
more information about TLP, see http://www.us-cert.gov/tlp/.

OVERVIEW

Ilya Karpov of Positive Technologies, Ivan Sanchez, Andrea Micalizzi, Ariele 
Caltabiano, Fritz Sands, Steven Seeley, and an anonymous researcher have 
identified multiple vulnerabilities in Advantech WebAccess application. Many 
of these vulnerabilities were reported through the Zero Day Initiative (ZDI) 
and iDefense. Advantech has produced a new version to mitigate these 
vulnerabilities. Ivan Sanchez has tested the new version to validate that it 
resolves the vulnerabilities which he reported.

These vulnerabilities could be exploited remotely.

AFFECTED PRODUCTS

Advantech reports that the vulnerabilities affect the following versions of 
WebAccess:

    WebAccess Version 8.0 and prior versions.

IMPACT

An attacker who exploits these vulnerabilities may be able to upload, create,
or delete arbitrary files on the target system, deny access to valid users, or
remotely execute arbitrary code.

Impact to individual organizations depends on many factors that are unique to
each organization. NCCIC/ICS-CERT recommends that organizations evaluate the 
impact of these vulnerabilities based on their operational environment, 
architecture, and product implementation.

BACKGROUND

Advantech is based in Taiwan and has distribution offices in 21 countries 
worldwide.

The affected product, WebAccess, formerly known as BroadWin WebAccess, is a 
web-based SCADA and human-machine interface (HMI) product. According to 
Advantech, WebAccess is deployed across several sectors including Commercial 
Facilities, Critical Manufacturing, Energy, and Government Facilities. 
Advantech estimates that these products are used globally.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

ACCESS OF MEMORY LOCATION AFTER END OF BUFFER [a]

The software reads or writes to a buffer using an index or pointer that 
references a memory location after the end of the buffer.

CVE-2016-0851 [b] has been assigned to this vulnerability. A CVSS v3 base score 
of 7.5 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). [c]

UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE [d]

An attacker can upload or create arbitrary files on the server without 
authentication or constraint.

CVE-2016-0854 [e] has been assigned to this vulnerability. A CVSS v3 base score 
of 9.8 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [f]

PATH TRAVERSAL [g]

The virtual directory created by WebAccess can be browsed anonymously without
authentication.

CVE-2016-0855 [h] has been assigned to this vulnerability. A CVSS v3 base score 
of 9.8 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [i]

STACK-BASED BUFFER OVERFLOW [j]

There are many instances where the buffer on the stack can be overwritten.

CVE-2016-0856 [k] has been assigned to this vulnerability. A CVSS v3 base score 
of 9.8 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [l]

HEAP-BASED BUFFER OVERFLOW [m]

There are many conditions in which more space than what is allocated can be 
written to the heap.

CVE-2016-0857 [n] has been assigned to this vulnerability. A CVSS v3 base score 
of 9.8 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [o]

RACE CONDITION [p]

A specially crafted request can cause a buffer overflow in a shared virtual 
memory area.

CVE-2016-0858 [q] has been assigned to this vulnerability. A CVSS v3 base score 
of 9.8 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [r]

INTEGER OVERFLOW TO BUFFER OVERFLOW [s]

An attacker can send a crafted RPC request to the Kernel service to cause a 
stack-based buffer overflow.

CVE-2016-0859 [t] has been assigned to this vulnerability. A CVSS v3 base score 
of 9.8 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). [u]

IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER [v]

An attacker can send a crafted RPC request to the BwpAlarm subsystem to cause
a buffer overflow on global variables.

CVE-2016-0860 [w] has been assigned to this vulnerability. A CVSS v3 base score 
of 7.5 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). [x]

IMPROPER ACCESS CONTROL [y]

Normal and remote users have access to files and folders that only 
administrators should be allowed to access.

CVE-2016-0852 [z] has been assigned to this vulnerability. A CVSS v3 base score 
of 7.5 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). [aa]

IMPROPER INPUT VALIDATION [bb]

Input validation vulnerabilities could allow an attacker to gain sensitive 
information from the target system.

CVE-2016-0853 [cc] has been assigned to this vulnerability. A CVSS v3 base score
of 7.5 has been calculated; the CVSS vector string is 
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). [dd]

CROSS-SITE SCRIPTING [ee]

The web server does not filter user input correctly, allowing a malicious user
to initiate a cross-site scripting vulnerability.

CVE-2015-3948 [ff] has been assigned to this vulnerability. A CVSS v3 base score
of 6.1 has been assigned; the CVSS vector string is 
(AV:N/AC:M/Au:S/C:N/I:P/A:N). [gg]

SQL INJECTION [hh]

Web server settings, accounts, and projects may be modified through scripted 
commands.

CVE-2015-3947 [ii] has been assigned to this vulnerability. A CVSS v3 base score
of 6.4 has been assigned; the CVSS vector string is 
(AV:N/AC:L/Au:S/C:C/I:C/A:N). [jj]

CROSS-SITE REQUEST FORGERY [kk]

The web server accepts commands via specific scripts that imitate trusted 
accounts.

CVE-2015-3946 [ll] has been assigned to this vulnerability. A CVSS v3 base score
of 5.4 has been assigned; the CVSS vector string is 
(AV:N/AC:H/Au:N/C:P/I:P/A:P). [mm]

EXTERNAL CONTROL OF FILE NAME OR PATH [nn]

WebAccess can be made to run remote code through the use of a browser plug-in.

CVE-2015-6467 [oo] has been assigned to this vulnerability. A CVSS v3 base score
of 4.3 has been assigned; the CVSS vector string is 
(AV:N/AC:M/Au:N/C:C/I:C/A:C). [pp]

CLEARTEXT STORAGE OF SENSITIVE INFORMATION [qq]

Email project accounts are stored in clear text.

CVE-2015-3943 [rr] has been assigned to this vulnerability. A CVSS v3 base score
of 4.3 has been assigned; the CVSS vector string is 
(AV:A/AC:L/Au:N/C:C/I:N/A:N). [ss]

VULNERABILITY DETAILS

EXPLOITABILITY

These vulnerabilities could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target these vulnerabilities.

DIFFICULTY

An attacker with a low skill would be able to exploit these vulnerabilities.

MITIGATION

Advantech has released a new version of WebAccess, Version 8.1, to address the
reported vulnerabilities. This new version is available on the Advantech 
website at the following location:

http://www.advantech.com/industrial-automation/webaccess (link is external)

ICS-CERT recommends that users take defensive measures to minimize the risk of
exploitation of these vulnerabilities. Specifically, users should:

Minimize network exposure for all control system devices and/or systems and 
ensure that they are not accessible from the Internet

Locate control system networks and remote devices behind firewalls and isolate
them from the business network.

When remote access is required, use secure methods, such as Virtual Private 
Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be
updated to the most current version available. Also recognize that VPN is only
as secure as the connected devices.

ICS-CERT reminds organizations to perform proper impact analysis and risk 
assessment prior to deploying defensive measures.

ICS-CERT also provides a section for control systems security recommended 
practices on the ICS-CERT web page 
athttp://ics-cert.us-cert.gov/content/recommended-practices. Several 
recommended practices are available for reading and download, including 
Improving Industrial Control Systems Cybersecurity with Defense-in-Depth 
Strategies.

Additional mitigation guidance and recommended practices are publicly 
available in the ICSCERT Technical Information Paper, 
ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation 
Strategies, that is available for download from the ICS-CERT web site 
(http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their 
established internal procedures and report their findings to ICS-CERT for 
tracking and correlation against other incidents.

a. CWE-788: Access of Memory Location After End of Buffer, 
http://cwe.mitre.org/data/definitions/788.html, web site last accessed January
14, 2016.

b. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0851, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

c. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

d. CWE-434: Unrestricted Upload of File with Dangerous Type, 
http://cwe.mitre.org/data/definitions/434.html, web site last accessed January
14, 2016.

e. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0854, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

f. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

g. CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path
Traversal'), http://cwe.mitre.org/data/definitions/22.html, web site last 
accessed January 14, 2016.

h. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0855, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

i. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

j. CWE-121: Stack-based Buffer Overflow, 
http://cwe.mitre.org/data/definitions/121.html, web site last accessed January
14, 2016.

k. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0856, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

l. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

m. CWE-122: Heap-based Buffer Overflow, 
http://cwe.mitre.org/data/definitions/122.html, web site last accessed January
14, 2016.

n. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0857, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

o. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

p. CWE-362: Concurrent Execution using Shared Resource with Improper 
Synchronization ('Race Condition'), 
http://cwe.mitre.org/data/definitions/362.html, web site last accessed January
14, 2016.

q. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0858, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

r. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

s. CWE-680: Integer Overflow to Buffer Overflow, 
http://cwe.mitre.org/data/definitions/680.html, web site last accessed January
14, 2016.

t. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0859, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

u. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

v. CWE-119: Improper Restriction of Operations within the Bounds of a Memory 
Buffer, http://cwe.mitre.org/data/definitions/119.html, web site last accessed
January 14, 2016.

w. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0860, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

x. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

y. CWE-284: Improper Access Control, 
http://cwe.mitre.org/data/definitions/284.html, web site last accessed January
14, 2016.

z. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0852, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

aa. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S... ,
web site last accessed January 14, 2016.

bb. CWE-20: Improper Input Validation, 
http://cwe.mitre.org/data/definitions/20.html, web site last accessed January
14, 2016.

cc. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0853, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

dd. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

ee. CWE-79: Improper Neutralization of Input During Web Page Generation 
('Cross-site Scripting'), http://cwe.mitre.org/data/definitions/79.html, web 
site last accessed January 14, 2016.

ff. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3948 , NIST
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

gg. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S..., 
web site last accessed January 14, 2016.

hh. CWE-89: SQL Injection, http://cwe.mitre.org/data/definitions/89.html, web
site last accessed January 14, 2016.

ii. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3947, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

jj. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S..., 
web site last accessed January 14, 2016.

kk. CWE-352: Cross-Site Request Forgery, 
http://cwe.mitre.org/data/definitions/352.html, web site last accessed January
14, 2016.

ll. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3946, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

mm. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S..., 
web site last accessed January 14, 2016.

nn. CWE-73: External Control of File Name or Path, 
http://cwe.mitre.org/data/definitions/73.html, web site last accessed January
14, 2016.

oo. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6467 , NIST
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

pp. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S..., 
web site last accessed January 14, 2016.

qq. CWE-312: Cleartext Storage of Sensitive Information, 
http://cwe.mitre.org/data/definitions/312.html, web site last accessed January
14, 2016.

rr. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3943, NIST 
uses this advisory to create the CVE web site report. This web site will be 
active sometime after publication of this advisory.

ss. CVSS Calculator, 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S..., 
web site last accessed January 14, 2016.

Contact Information

For any questions related to this report, please contact ICS-CERT at:

Email: ics-cert@hq.dhs.gov (link sends e-mail)

Toll Free: 1-877-776-7585

International Callers: (208) 526-0900

For industrial control systems security information and incident reporting: 
http://ics-cert.us-cert.gov

ICS-CERT continuously strives to improve its products and services. You can 
help by choosing one of the links below to provide feedback about this 
product.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=HHOV
-----END PGP SIGNATURE-----