Advantech / BroadWin WebAccess webvrpcs.exe Service Remote Code Execution (credentialed check)

critical Nessus Plugin ID 56994

Synopsis

The remote host is running a service that is affected by remote code execution and information disclosure vulnerabilities.

Description

The Advantech WebAccess software installed on the remote Windows host includes an RPC service (webvrpcs.exe) that listens remotely on TCP port 4592. It is affected by two vulnerabilities :

- An overflow condition exists due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary code.

- An information disclosure vulnerability exists that allows an unauthenticated, remote attacker to obtain the security code value that protects the SCADA node via a long string in an RPC request to TCP port 4592.

Solution

Upgrade to Advantech WebAccess 7.1 2013.05.30 or later.

See Also

http://www.nessus.org/u?d44f6112

https://seclists.org/bugtraq/2011/Mar/214

https://ics-cert.us-cert.gov/advisories/ICSA-11-094-02B

Plugin Details

Severity: Critical

ID: 56994

File Name: scada_advantech_webaccess_rce_local.nbin

Version: 1.222

Type: local

Agent: windows

Family: SCADA

Published: 12/2/2011

Updated: 3/26/2024

Asset Inventory: true

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 9

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-4041

Vulnerability Information

CPE: cpe:/a:advantech:webaccess, cpe:/a:broadwin:webaccess

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/1/2014

Vulnerability Publication Date: 3/22/2011

Reference Information

CVE: CVE-2011-4041

BID: 47008

ICSA: 11-094-02B