Advisory Details

April 8th, 2020

(0Day) Advantech WebAccess webvrpc IOCTL 0x2715 Arbitrary File Deletion Vulnerability

ZDI-20-446
ZDI-CAN-10175

CVE ID CVE-2020-12010
CVSS SCORE 8.2, AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
AFFECTED VENDORS Advantech
AFFECTED PRODUCTS WebAccess
VULNERABILITY DETAILS

This vulnerability allows remote attackers to delete arbitrary files on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the implementation of IOCTL 0x2715 in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of Administrator.

ADDITIONAL DETAILS

This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.

02/21/20 – ZDI reported the vulnerability to ICS-CERT
02/21/20 – ICS-CERT provided ZDI with an ICS-VU #
03/26/20 – The vendor communicated that they will rely on existing measures and will add no amendments to the code
03/30/20 – ZDI notified ICS-CERT of the intention to publish the cases as 0-day advisories on 04/08/20

-- Mitigation:
Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the service to trusted machines. Only the clients and servers that have a legitimate procedural relationship with the service should be permitted to communicate with it. This could be accomplished in a number of ways, most notably with firewall rules/whitelisting.


DISCLOSURE TIMELINE
  • 2020-02-21 - Vulnerability reported to vendor
  • 2020-04-08 - Coordinated public release of advisory
CREDIT Natnael Samson (@NattiSamson)
BACK TO ADVISORIES