ID

VAR-201710-1110


CVE

CVE-2017-12705


TITLE

Advantech WebOP Buffer error vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2017-009636 // CNNVD: CNNVD-201708-1072

DESCRIPTION

A Heap-Based Buffer Overflow issue was discovered in Advantech WebOP. A maliciously crafted project file may be able to trigger a heap-based buffer overflow, which may crash the process and allow an attacker to execute arbitrary code. Advantech WebOP Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebOP Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of a pm3 project file. Advantech WebOP is an operator panel product. Failed exploit attempts will likely cause a denial-of-service condition. Advantech WebOP is an integrated human-machine interface development tool developed by Advantech. The product has functions such as data transmission, menu editing and text editing

Trust: 3.33

sources: NVD: CVE-2017-12705 // JVNDB: JVNDB-2017-009636 // ZDI: ZDI-17-452 // CNVD: CNVD-2017-22809 // BID: 99476 // IVD: c2851008-216a-499a-ba91-1d6a0cfc5485 // VULHUB: VHN-103254

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: c2851008-216a-499a-ba91-1d6a0cfc5485 // CNVD: CNVD-2017-22809

AFFECTED PRODUCTS

vendor:advantechmodel:webopscope:eqversion: -

Trust: 1.6

vendor:advantechmodel:webop designerscope: - version: -

Trust: 1.3

vendor:advantechmodel:webopscope: - version: -

Trust: 0.8

vendor:advantechmodel:webop designerscope:eqversion:0

Trust: 0.3

vendor:webopmodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: c2851008-216a-499a-ba91-1d6a0cfc5485 // ZDI: ZDI-17-452 // CNVD: CNVD-2017-22809 // BID: 99476 // JVNDB: JVNDB-2017-009636 // CNNVD: CNNVD-201708-1072 // NVD: CVE-2017-12705

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12705
value: HIGH

Trust: 1.0

NVD: CVE-2017-12705
value: HIGH

Trust: 0.8

ZDI: CVE-2017-12705
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2017-22809
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201708-1072
value: MEDIUM

Trust: 0.6

IVD: c2851008-216a-499a-ba91-1d6a0cfc5485
value: MEDIUM

Trust: 0.2

VULHUB: VHN-103254
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-12705
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2017-12705
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2017-22809
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: c2851008-216a-499a-ba91-1d6a0cfc5485
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-103254
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12705
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: c2851008-216a-499a-ba91-1d6a0cfc5485 // ZDI: ZDI-17-452 // CNVD: CNVD-2017-22809 // VULHUB: VHN-103254 // JVNDB: JVNDB-2017-009636 // CNNVD: CNNVD-201708-1072 // NVD: CVE-2017-12705

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-103254 // JVNDB: JVNDB-2017-009636 // NVD: CVE-2017-12705

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201708-1072

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: c2851008-216a-499a-ba91-1d6a0cfc5485 // CNNVD: CNNVD-201708-1072

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009636

PATCH

title:WebOPurl:http://www.advantech.in/products/search/?q=WebOP

Trust: 0.8

title:Patch for Advantech WebOP Designer heap buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/100828

Trust: 0.6

sources: CNVD: CNVD-2017-22809 // JVNDB: JVNDB-2017-009636

EXTERNAL IDS

db:NVDid:CVE-2017-12705

Trust: 4.3

db:ICS CERTid:ICSA-17-227-01

Trust: 2.8

db:BIDid:99476

Trust: 2.6

db:ZDIid:ZDI-17-452

Trust: 1.6

db:CNNVDid:CNNVD-201708-1072

Trust: 0.9

db:CNVDid:CNVD-2017-22809

Trust: 0.8

db:JVNDBid:JVNDB-2017-009636

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3703

Trust: 0.7

db:NSFOCUSid:37428

Trust: 0.6

db:IVDid:C2851008-216A-499A-BA91-1D6A0CFC5485

Trust: 0.2

db:VULHUBid:VHN-103254

Trust: 0.1

sources: IVD: c2851008-216a-499a-ba91-1d6a0cfc5485 // ZDI: ZDI-17-452 // CNVD: CNVD-2017-22809 // VULHUB: VHN-103254 // BID: 99476 // JVNDB: JVNDB-2017-009636 // CNNVD: CNNVD-201708-1072 // NVD: CVE-2017-12705

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-227-01

Trust: 2.8

url:http://www.securityfocus.com/bid/99476

Trust: 2.3

url:http://www.zerodayinitiative.com/advisories/zdi-17-452/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12705

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12705

Trust: 0.8

url:http://www.nsfocus.net/vulndb/37428

Trust: 0.6

url:http://www.advantech.in/

Trust: 0.3

sources: CNVD: CNVD-2017-22809 // VULHUB: VHN-103254 // BID: 99476 // JVNDB: JVNDB-2017-009636 // CNNVD: CNNVD-201708-1072 // NVD: CVE-2017-12705

CREDITS

Ariele Caltabiano (kimiya).

Trust: 0.9

sources: BID: 99476 // CNNVD: CNNVD-201708-1072

SOURCES

db:IVDid:c2851008-216a-499a-ba91-1d6a0cfc5485
db:ZDIid:ZDI-17-452
db:CNVDid:CNVD-2017-22809
db:VULHUBid:VHN-103254
db:BIDid:99476
db:JVNDBid:JVNDB-2017-009636
db:CNNVDid:CNNVD-201708-1072
db:NVDid:CVE-2017-12705

LAST UPDATE DATE

2025-04-20T23:19:45.549000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-452date:2017-08-15T00:00:00
db:CNVDid:CNVD-2017-22809date:2017-08-25T00:00:00
db:VULHUBid:VHN-103254date:2017-11-14T00:00:00
db:BIDid:99476date:2017-08-16T11:10:00
db:JVNDBid:JVNDB-2017-009636date:2017-11-17T00:00:00
db:CNNVDid:CNNVD-201708-1072date:2017-11-01T00:00:00
db:NVDid:CVE-2017-12705date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:c2851008-216a-499a-ba91-1d6a0cfc5485date:2017-08-25T00:00:00
db:ZDIid:ZDI-17-452date:2017-08-15T00:00:00
db:CNVDid:CNVD-2017-22809date:2017-08-25T00:00:00
db:VULHUBid:VHN-103254date:2017-10-25T00:00:00
db:BIDid:99476date:2017-07-05T00:00:00
db:JVNDBid:JVNDB-2017-009636date:2017-11-17T00:00:00
db:CNNVDid:CNNVD-201708-1072date:2017-07-05T00:00:00
db:NVDid:CVE-2017-12705date:2017-10-25T07:29:00.227