CVE-2018-10589

9.8 CRITICAL

📋 TL;DR

A path traversal vulnerability in Advantech WebAccess allows attackers to execute arbitrary code by manipulating file paths. This affects multiple WebAccess products including SCADA systems used in industrial control environments. Organizations using vulnerable versions are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Advantech WebAccess
  • Advantech WebAccess Dashboard
  • Advantech WebAccess Scada Node
  • Advantech WebAccess/NMS
Versions: WebAccess V8.2_20170817 and prior, V8.3.0 and prior; Dashboard V.2.0.15 and prior; Scada Node prior to 8.3.1; NMS 2.0.3 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Industrial control systems (ICS) environments are primarily affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing remote code execution, potential ransomware deployment, manipulation of industrial processes, and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive files, privilege escalation, and installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact with proper network segmentation, application whitelisting, and minimal privileges.

🌐 Internet-Facing: HIGH - CVSS 9.8 indicates critical severity for internet-exposed systems.
🏢 Internal Only: HIGH - Even internally, successful exploitation leads to complete system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are commonly exploited with simple HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: WebAccess 8.3.1 and later, Dashboard 2.0.16+, NMS 2.0.4+

Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01

Restart Required: Yes

Instructions:

1. Download latest version from Advantech support portal. 2. Backup configuration and data. 3. Install update following vendor documentation. 4. Restart services/systems. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate WebAccess systems from untrusted networks and internet.

Application Whitelisting

windows

Restrict execution to authorized applications only.

🧯 If You Can't Patch

  • Implement strict network access controls and firewall rules to limit exposure
  • Deploy intrusion detection systems and monitor for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check installed version against affected versions list. Review system logs for path traversal attempts.

Check Version:

Check WebAccess About dialog or installation directory version files.

Verify Fix Applied:

Confirm version is 8.3.1 or later for WebAccess, 2.0.16+ for Dashboard, 2.0.4+ for NMS.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path access patterns
  • ../ or ..\ sequences in HTTP requests
  • Unauthorized file read/write attempts

Network Indicators:

  • HTTP requests with directory traversal sequences
  • Unexpected outbound connections from WebAccess systems

SIEM Query:

source="webaccess" AND ("..\" OR "../" OR "%2e%2e" OR "%252e%252e")

🔗 References

📤 Share & Export