If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server.
Solution:
Workaround:
The product does not properly distinguish between different types of elements in a way that leads to insecure behavior.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01 | third party advisory us government resource |