Advisory Details

August 21st, 2023

Advantech R-SeeNet device_status Local File Inclusion Privilege Escalation Vulnerability

ZDI-23-1157
ZDI-CAN-19579

CVE ID CVE-2023-3256
CVSS SCORE 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Advantech
AFFECTED PRODUCTS R-SeeNet
VULNERABILITY DETAILS

This vulnerability allows remote attackers to escalate privileges on affected installations of Advantech R-SeeNet. Authentication is required to exploit this vulnerability.

The specific flaw exists within the device_status page. The issue results from the lack of proper validation of user-supplied data prior to passing it to a PHP include function. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.

ADDITIONAL DETAILS Advantech has issued an update to correct this vulnerability. More details can be found at:
https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-02
DISCLOSURE TIMELINE
  • 2022-12-23 - Vulnerability reported to vendor
  • 2023-08-21 - Coordinated public release of advisory
CREDIT Esjay (@esj4y)
BACK TO ADVISORIES