Tenable Research Advisory: Advantech WebAccess Remote Command Execution Still Exploitable
Tenable Researcher Chris Lyne discovered that Advantech WebAccess versions 8.3, 8.3.1 and 8.3.2 are still vulnerable to remote command execution CVE-2017-16720, which was originally disclosed by ZDI in January 2018 and has a public exploit.
背景說明
Tenable Research’s Chris Lyne has discovered that Advantech WebAccess remains unprotected against a public exploit several months after a patch was released. Vulnerable WebAccess instances remain susceptible to an unauthenticated remote code execution (RCE) attack (CVE-2017-16720). WebAccess versions 8.3, 8.3.1 and 8.3.2 are affected.
On January 4, 2018, ICS-CERT released ICSA-18-004-02A to detail several vulnerabilities reported for Advantech WebAccess. One of the vulnerabilities, CVE-2017-16720, which was also disclosed by the Zero Day Initiative (ZDI), allows an unauthenticated remote attacker to execute arbitrary system commands.
The mitigation section of the ICS-CERT advisory states, “Advantech has released WebAccess Version 8.3 to address the reported vulnerabilities.” In March, two months after the release of the ICS-CERT advisory, a public exploit leveraging CVE-2017-16720 was published to the Exploit Database.
Vulnerability details
This vulnerability allows for remote command execution via the Remote Procedure Call (RPC) protocol over TCP port 4592. By utilizing malicious Distributed Computing Environment / Remote Procedure Calls (DCERPC), the webvrpcs.exe service will pass command line instructions to the host.
The webvrpcs.exe service runs with administrator access rights, which means an attacker can take control of an asset at that privilege level.
Exploitation
There is a publicly available Proof of Concept (PoC) for this vulnerability. Little additional research would be required for an attacker to utilize this PoC against any WebAccess target.
Since this vulnerability was not previously patched, and a public exploit has been available for quite some time, up-to-date assets running WebAccess could have been exploited.
Vendor response
ICS-CERT indicates Advantech has a fix that will be released in September. We will update this section as we get more information, and remediation information becomes available.
Identifying Affected Systems
Tenable has the following plugin available for identifying vulnerable assets.
Plugin ID |
說明 |
Advantech WebAccess/SCADA Network Service Detection |
深入瞭解
- Visit the Tenable Techblog on Medium to read researcher Chris Lyne's in-depth story about his work uncovering this vulnerability.
- Visit the Tenable Research Advisories page to stay up-to-date on security vulnerabilities in third-party software discovered by a dedicated team supported by researchers and engineers at Tenable.
Learn more about Tenable.io, the first Cyber Exposure platform for holistic management of your modern attack surface. Get a free 60-day trial of Tenable.io Vulnerability Management.
相關文章
- Vulnerability Management