Advantech WebAccess/NMS
Advantech WebAccess/NMS versions prior to 3.0.2 contain multiple critical vulnerabilities including improper file upload validation (CWE-434), SQL injection (CWE-89), directory traversal (CWE-23), missing authentication (CWE-306), XML external entity injection (CWE-611), and command injection (CWE-78). These vulnerabilities can be exploited remotely without authentication to gain remote code execution, upload or delete files, create unauthorized administrator accounts, and cause denial-of-service conditions. No known public exploits are currently in circulation, but the high CVSS score (9.8) and lack of complexity indicate significant risk.
- Network access to the WebAccess/NMS web server (typically port 80 or 443)
- No authentication required for exploitation of the initial vulnerability
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1c50c75f-9513-4eb1-8987-41e67ec69208Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.