CVE-2019-18231
https://notcve.org/view.php?id=CVE-2019-18231
Advantech Spectre RT ERT351 Versions 5.1.3 and prior logins and passwords are transmitted in clear text form, which may allow an attacker to intercept the request. Advantech Spectre RT ERT351 Versiones 5.1.3 y anteriores, los inicios de sesión y contraseñas son transmitidos en forma de texto sin cifrar, que puede permitir a un atacante interceptar la petición • https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03 • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2019-18233
https://notcve.org/view.php?id=CVE-2019-18233
In Advantech Spectre RT Industrial Routers ERT351 5.1.3 and prior, the affected product does not neutralize special characters in the error response, allowing attackers to use a reflected XSS attack. En Advantech Spectre RT Industrial Routers ERT351 versiones 5.1.3 y anteriores, el producto afectado no neutraliza los caracteres especiales en la respuesta de error, permitiendo a atacantes usar un ataque de tipo XSS reflejado • https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-054-03 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-13554
https://notcve.org/view.php?id=CVE-2020-13554
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Se presenta una vulnerabilidad de elevación de privilegios local explotable en los permisos del sistema de archivos de la instalación de Advantech WebAccess/SCADA versión 9.0.1. En webvrpcs Run Key Privilege Escalation en la carpeta de instalación de WebAccess, un atacante puede reemplazar módulos binarios o cargados para ejecutar código con privilegios NT SYSTEM • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 • CWE-276: Incorrect Default Permissions •
CVE-2021-22667 – Advantech BB-ESWGP506-2SFP-T Use of Hard-coded Credentials Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-22667
BB-ESWGP506-2SFP-T versions 1.01.09 and prior is vulnerable due to the use of hard-coded credentials, which may allow an attacker to gain unauthorized access and permit the execution of arbitrary code on the BB-ESWGP506-2SFP-T (versions 1.01.01 and prior). BB-ESWGP506-2SFP-T versiones 1.01.09 y anteriores, es vulnerable debido al uso de credenciales embebidas, lo que puede permitir a un atacante conseguir acceso no autorizado y permitir una ejecución de código arbitraria en BB-ESWGP506-2SFP-T (versiones 1.01.01 y anteriores) This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech BB-ESWGP506-2SFP-T industrial switches. Authentication is not required to exploit this vulnerability. The specific flaw exists within the telnet service, which listens on TCP port 23 by default. The service contains a hard-coded password for the administrator user account. An attacker can leverage this vulnerability to execute code in the context of the administrator user. • https://us-cert.cisa.gov/ics/advisories/icsa-21-054-02 https://www.zerodayinitiative.com/advisories/ZDI-21-593 • CWE-798: Use of Hard-coded Credentials •
CVE-2020-13555
https://notcve.org/view.php?id=CVE-2020-13555
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Se presenta una vulnerabilidad de elevación de privilegios local explotable en los permisos del sistema de archivos de la instalación de Advantech WebAccess/SCADA versión 9.0.1. En COM Server Application Privilege Escalation, un atacante puede reemplazar módulos binarios o cargados para ejecutar código con privilegios NT SYSTEM • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169 • CWE-276: Incorrect Default Permissions •