The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.
Workaround:
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-03 | us government resource third party advisory patch |
http://packetstormsecurity.com/files/165252/WebHMI-4.0-Remote-Code-Execution.html | exploit vdb entry third party advisory |