CVE-2020-10619

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to delete arbitrary files on WebAccess/NMS systems by exploiting improper input validation in URL handling. Affected systems are Advantech WebAccess/NMS versions prior to 3.0.2, which could lead to system disruption or data loss.

💻 Affected Systems

Products:
  • Advantech WebAccess/NMS
Versions: All versions prior to 3.0.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: WebAccess/NMS is typically deployed on Windows systems for industrial control system monitoring.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to service disruption, data loss, or potential privilege escalation.

🟠

Likely Case

Service disruption through deletion of application files, configuration files, or user data, potentially causing downtime.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Directly exploitable via crafted URLs without authentication if exposed to internet.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a crafted URL, making it trivial for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.2

Vendor Advisory: https://www.advantech.com/support

Restart Required: Yes

Instructions:

1. Download WebAccess/NMS version 3.0.2 or later from Advantech support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the WebAccess/NMS service.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate WebAccess/NMS systems from untrusted networks and internet

Access Control Lists

windows

Restrict network access to WebAccess/NMS to authorized IP addresses only

netsh advfirewall firewall add rule name="WebAccess_NMS" dir=in action=allow protocol=TCP localport=80,443 remoteip=192.168.1.0/24,10.0.0.0/8

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to WebAccess/NMS
  • Monitor for suspicious file deletion activities and URL patterns in application logs

🔍 How to Verify

Check if Vulnerable:

Check WebAccess/NMS version in application interface or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Advantech\WebAccess\NMS\Version

Check Version:

reg query "HKLM\SOFTWARE\Advantech\WebAccess\NMS" /v Version

Verify Fix Applied:

Confirm version is 3.0.2 or higher and test URL path traversal attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events
  • URL requests with ../ patterns or unusual path traversal attempts
  • Failed authentication attempts followed by file operations

Network Indicators:

  • HTTP requests with crafted URLs containing path traversal sequences
  • Unusual outbound connections after file deletion attempts

SIEM Query:

source="webaccess_logs" AND (url="*../*" OR event="file_delete" OR status=500)

🔗 References

📤 Share & Export