CVE-2020-13550
📋 TL;DR
A local file inclusion vulnerability in Advantech WebAccess/SCADA 9.0.1 allows authenticated attackers to read arbitrary files on the system. This affects organizations using Advantech's industrial control system software for SCADA operations. The vulnerability requires authentication but can lead to sensitive information disclosure.
💻 Affected Systems
- Advantech WebAccess/SCADA
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive configuration files, credentials, or proprietary data, potentially enabling further attacks on industrial control systems.
Likely Case
Information disclosure of system files, configuration data, or application files that could aid in reconnaissance for additional attacks.
If Mitigated
Limited impact with proper network segmentation, authentication controls, and file system permissions restricting access to sensitive files.
🎯 Exploit Status
Exploitation requires authenticated HTTP requests. Proof of concept details are publicly available in the Talos Intelligence report.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.0.2 or later
Vendor Advisory: https://www.advantech.com/support/details/firmware?id=1-2S6VLB
Restart Required: Yes
Instructions:
1. Download the latest version from Advantech's support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the WebAccess/SCADA service.
🔧 Temporary Workarounds
Restrict network access
allLimit access to WebAccess/SCADA to only trusted networks and users
Configure firewall rules to restrict access to WebAccess ports (typically 80/443)
Strengthen authentication
allImplement strong password policies and multi-factor authentication
Enforce complex passwords, account lockout policies, and consider MFA integration
🧯 If You Can't Patch
- Implement strict network segmentation to isolate WebAccess/SCADA systems from untrusted networks
- Apply principle of least privilege to file system permissions and restrict access to sensitive directories
🔍 How to Verify
Check if Vulnerable:
Check WebAccess/SCADA version in the application interface or installation directory. Version 9.0.1 is vulnerable.
Check Version:
Check Help > About in WebAccess client or examine installation directory properties
Verify Fix Applied:
Verify version is 9.0.2 or later after patching. Test file inclusion attempts should fail.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in WebAccess logs
- Multiple failed authentication attempts followed by successful login and file requests
Network Indicators:
- HTTP requests with file path traversal patterns to WebAccess installation endpoints
SIEM Query:
source="webaccess" AND (url="*../*" OR url="*..\\*" OR url="*install*" AND status=200)