PT-2016-03: SQL Injection in Advantech WebAccess Vulnerable softwareAdvantech WebAccess Version: 8.0 and earlierLinks: http://www.advantech.com/products/webaccess-solutions/Severity levelSeverity level: Medium Impact: Cross-Site Scripting Access Vector: Remote CVSS v2: Base Score: 6.5 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:P)CVE: CVE-2015-3947Software descriptionAdvantech WebAccess is a browser-based software package for human-machine interfaces HMI, and supervisory control and data acquisition SCADA. It is used to automate complex industrial processes for situations where remote operations are needed.Vulnerability descriptionThe specialists of the Positive Research center have detected an SQL Injection vulnerability in Advantech WebAccess.Advantech WebAccess before 8.1 allows remote authenticated users to execute arbitrary SQL commands to modify web server settings, accounts, and projects.How to fixUpdate your software up to the latest versionAdvisory status 15.12.2014 - Vendor gets vulnerability details 14.01.2016 - Vendor releases fixed version and details 10.03.2016 - Public disclosureCreditsThe vulnerability was detected by Alexey Osipov, Ilya Karpov and Timur Yunusov, Positive Research Center (Positive Technologies Company)References http://en.securitylab.ru/lab/PT-2016-03 https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com http://en.securitylab.ru/lab/