Advantech WebAccess/SCADA
Advantech WebAccess/SCADA versions 8.3.5 and earlier contain multiple input validation and memory management vulnerabilities (CWE-77 command injection, CWE-121 stack-based buffer overflow, CWE-284 improper access control). These flaws allow unauthenticated remote attackers to execute arbitrary code on the SCADA server and cause denial of service. Successful exploitation could allow an attacker to modify process configurations, halt monitoring operations, or disrupt SCADA visibility and control of energy infrastructure.
- Network access to the WebAccess/SCADA server (typically port 80 or 443)
- No authentication required
- Vulnerable version (8.3.5 or earlier) deployed and reachable from the attacker's network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5832047e-1888-4ed9-ab10-91ae3e835e99Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.