CVE-2020-16245

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Advantech iView allows attackers to bypass path restrictions and access arbitrary files on the system. It affects all versions 5.7 and prior, enabling remote code execution, file manipulation, and denial of service attacks against industrial control systems.

💻 Affected Systems

Products:
  • Advantech iView
Versions: 5.7 and all prior versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of iView 5.7 and earlier. Used in industrial control systems and SCADA environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution leading to complete control of the iView server, potential lateral movement to other industrial systems, and disruption of critical operations.

🟠

Likely Case

Unauthorized file access/download, creation of malicious files, and potential remote code execution leading to system compromise.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only file enumeration without code execution.

🌐 Internet-Facing: HIGH - Directly exploitable remotely without authentication, CVSS 9.8 indicates critical risk for internet-facing systems.
🏢 Internal Only: HIGH - Even internally, this allows attackers with network access to compromise the system and potentially move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple ZDI advisories indicate weaponization is likely. Path traversal vulnerabilities are typically easy to exploit with publicly available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 5.7 or later with security updates

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-20-238-01

Restart Required: Yes

Instructions:

1. Download and install iView version 5.7 or later from Advantech support portal. 2. Stop iView service. 3. Install the update. 4. Restart iView service. 5. Verify installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate iView systems from untrusted networks and internet access

Access Control Lists

windows

Restrict network access to iView using firewall rules

# Windows firewall example: New-NetFirewallRule -DisplayName "Block iView External" -Direction Inbound -Protocol TCP -LocalPort 80,443 -Action Block

🧯 If You Can't Patch

  • Remove iView from internet-facing networks immediately
  • Implement strict network segmentation and monitor all iView network traffic

🔍 How to Verify

Check if Vulnerable:

Check iView version in application interface or installation directory. Versions 5.7 and earlier are vulnerable.

Check Version:

Check iView web interface or installation directory for version information

Verify Fix Applied:

Verify iView version is updated beyond 5.7 and test path traversal attempts return proper errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Path traversal strings in web logs (../, ..\, %2e%2e%2f)
  • Unauthorized file creation/modification

Network Indicators:

  • HTTP requests with path traversal sequences to iView endpoints
  • Unexpected file downloads from iView

SIEM Query:

source="iView_logs" AND ("..\" OR "../" OR "%2e%2e" OR "path traversal")

🔗 References

📤 Share & Export