ID

VAR-201804-1750


TITLE

(0Day) Advantech WebAccess HMI Designer PM2 File Conversion Double Free Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-18-364

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess HMI Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the conversion of a PM2 file to the PM3 format. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process.

Trust: 0.7

sources: ZDI: ZDI-18-364

AFFECTED PRODUCTS

vendor:advantechmodel:webaccess hmi designerscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-18-364

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-18-364
value: MEDIUM

Trust: 0.7

ZDI: ZDI-18-364
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

sources: ZDI: ZDI-18-364

EXTERNAL IDS

db:ZDI_CANid:ZDI-CAN-5249

Trust: 0.7

db:ZDIid:ZDI-18-364

Trust: 0.7

sources: ZDI: ZDI-18-364

CREDITS

Steven Seeley (mr_me) of Source Incite

Trust: 0.7

sources: ZDI: ZDI-18-364

SOURCES

db:ZDIid:ZDI-18-364

LAST UPDATE DATE

2022-05-17T02:08:56.765000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-18-364date:2018-04-20T00:00:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-18-364date:2018-04-20T00:00:00