Vulnerability Description
A SQL Injection issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. By submitting a specially crafted parameter, it is possible to inject arbitrary SQL statements that could allow an attacker to obtain sensitive information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Advantech | Webaccess | <= 8.2 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/100526Third Party AdvisoryVDB Entry
- http://www.zerodayinitiative.com/advisories/ZDI-17-712/
- https://ics-cert.us-cert.gov/advisories/ICSA-17-241-02Third Party AdvisoryUS Government Resource
- https://www.tenable.com/security/research/tra-2017-29
- http://www.securityfocus.com/bid/100526Third Party AdvisoryVDB Entry
- http://www.zerodayinitiative.com/advisories/ZDI-17-712/
- https://ics-cert.us-cert.gov/advisories/ICSA-17-241-02Third Party AdvisoryUS Government Resource
- https://www.tenable.com/security/research/tra-2017-29
FAQ
What is CVE-2017-12710?
CVE-2017-12710 is a vulnerability with a CVSS score of 7.5 (HIGH). A SQL Injection issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. By submitting a specially crafted parameter, it is possible to inject arbitrary SQL statements that could a...
How severe is CVE-2017-12710?
CVE-2017-12710 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-12710?
Check the references section above for vendor advisories and patch information. Affected products include: Advantech Webaccess.