CVE-2020-16213

7.8 HIGH

📋 TL;DR

This vulnerability in Advantech WebAccess HMI Designer allows attackers to execute arbitrary code by tricking users into opening malicious project files. It affects industrial control system operators using vulnerable versions of this HMI design software. Successful exploitation could compromise the entire HMI development environment.

💻 Affected Systems

Products:
  • Advantech WebAccess HMI Designer
Versions: 2.1.9.31 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of vulnerable versions regardless of configuration. HMI Designer is typically used in engineering workstations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, lateral movement to industrial control networks, and potential disruption of critical infrastructure operations.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to HMI design projects, theft of intellectual property, and potential manipulation of industrial control logic.

🟢

If Mitigated

Application crash with denial of service to HMI design functionality, but no code execution due to proper security controls.

🌐 Internet-Facing: MEDIUM - While the software itself isn't typically internet-facing, malicious project files could be delivered via email or compromised websites.
🏢 Internal Only: HIGH - Attackers with internal access or who can trick users into opening malicious files can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to open malicious project files. The vulnerability is well-documented with public advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.9.32 or later

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-20-219-02

Restart Required: Yes

Instructions:

1. Download updated version from Advantech support portal. 2. Uninstall current version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict project file execution

windows

Configure Windows to open .prj files with a text editor instead of HMI Designer

Right-click .prj file > Open With > Choose another app > Select Notepad > Always use this app

Application whitelisting

windows

Use AppLocker or similar to restrict execution of HMI Designer to authorized users only

🧯 If You Can't Patch

  • Isolate HMI Designer workstations from production networks and internet access
  • Implement strict user training about opening project files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check Help > About in HMI Designer for version number. Versions 2.1.9.31 and earlier are vulnerable.

Check Version:

Not applicable - check via GUI Help > About menu

Verify Fix Applied:

Verify version is 2.1.9.32 or later in Help > About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of HMI Designer
  • Unusual process creation from HMI Designer
  • Failed attempts to open corrupted project files

Network Indicators:

  • Unusual network connections originating from HMI Designer workstations
  • File transfers of .prj files to engineering workstations

SIEM Query:

EventID=1000 OR EventID=1001 Source='HMI Designer' OR ProcessName='HMI Designer.exe' AND (CommandLine CONTAINS '.prj' OR ParentProcess CONTAINS 'explorer.exe')

🔗 References

📤 Share & Export