CVE-2019-13551

9.8 CRITICAL

📋 TL;DR

This critical path traversal vulnerability in Advantech WISE-PaaS/RMM allows attackers to bypass directory restrictions and access arbitrary files or execute code remotely by manipulating file paths. Systems running WISE-PaaS/RMM version 3.3.29 or earlier are affected, particularly those exposed to untrusted networks.

💻 Affected Systems

Products:
  • Advantech WISE-PaaS/RMM
Versions: 3.3.29 and prior
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Default installations are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with administrator privileges leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Unauthorized file access, configuration file manipulation, and potential privilege escalation leading to system control.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and input validation controls in place.

🌐 Internet-Facing: HIGH - Directly exploitable over network without authentication in default configurations.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit this vulnerability to gain elevated privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple ZDI advisories confirm weaponization; exploitation requires minimal technical skill due to lack of authentication requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.3.30 or later

Vendor Advisory: https://www.advantech.com/support

Restart Required: Yes

Instructions:

1. Download latest version from Advantech support portal. 2. Backup current configuration. 3. Install update following vendor documentation. 4. Restart services. 5. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate WISE-PaaS/RMM systems from untrusted networks and internet exposure

Input Validation Rules

all

Implement web application firewall rules to block path traversal patterns

WAF rule: deny requests containing '../' or similar traversal sequences

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted IPs only
  • Deploy application-level monitoring for path traversal attempts and file access anomalies

🔍 How to Verify

Check if Vulnerable:

Check WISE-PaaS/RMM version via admin interface or configuration files; versions ≤3.3.29 are vulnerable

Check Version:

Check web interface or configuration files for version information

Verify Fix Applied:

Verify version is ≥3.3.30 and test path traversal attempts return proper error responses

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences
  • Unauthorized file access attempts
  • Unusual file operations in system logs

Network Indicators:

  • HTTP requests with encoded traversal patterns (%2e%2e%2f)
  • Multiple failed file access attempts from single source

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*..%2f*" OR uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export