CVE-2022-50594

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication and execute SQL injection attacks on Advantech iView systems. Attackers can exfiltrate user data including clear-text passwords. Organizations using Advantech iView versions before v5.7.04 build 6425 are affected.

💻 Affected Systems

Products:
  • Advantech iView
Versions: All versions prior to v5.7.04 build 6425
Operating Systems: Windows-based systems running iView
Default Config Vulnerable: ⚠️ Yes
Notes: The SNMP management tool must be enabled, but this is commonly part of default configurations for network monitoring.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the iView system, credential theft, potential lateral movement to connected industrial control systems, and data exfiltration.

🟠

Likely Case

Unauthorized access to user credentials and sensitive data stored in the iView database, potentially leading to further system compromise.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the vulnerable endpoint.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The authentication bypass combined with SQL injection makes exploitation straightforward with available public details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v5.7.04 build 6425 or later

Vendor Advisory: https://www.advantech.tw/support/details/firmware?id=1-HIPU-183

Restart Required: Yes

Instructions:

1. Download the patched version from Advantech's support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the iView service or system.

🔧 Temporary Workarounds

Disable SNMP Management Tool

all

Temporarily disable the vulnerable SNMP management component if not required.

Navigate to iView configuration > SNMP settings > Disable SNMP management

Network Access Control

linux

Restrict network access to the iView system using firewall rules.

iptables -A INPUT -p tcp --dport [iView-port] -s [trusted-ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [iView-port] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate iView systems from untrusted networks
  • Deploy a web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check iView version in the web interface or configuration files. If version is below 5.7.04 build 6425, the system is vulnerable.

Check Version:

Check the iView web interface > About section or examine configuration files for version information.

Verify Fix Applied:

Verify the version shows 5.7.04 build 6425 or higher after patching. Test that the NetworkServlet endpoint no longer accepts malicious SQL injection payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed authentication attempts followed by successful access to NetworkServlet
  • Outbound connections from iView system to unknown IPs

Network Indicators:

  • HTTP POST requests to /NetworkServlet with SQL injection patterns in parameters
  • Unusual database connection patterns from the iView host

SIEM Query:

source="iView_logs" AND (uri="/NetworkServlet" AND (param="data" AND value MATCH "'.*' OR .*"))

🔗 References

📤 Share & Export