PT-2016-03: SQL Injection in Advantech WebAccess

Vulnerable software

Advantech WebAccess
Version: 8.0 and earlier


Severity level

Severity level: Medium
Impact: Cross-Site Scripting
Access Vector: Remote

CVSS v2:
Base Score: 6.5
Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVE: CVE-2015-3947

Software description

Advantech WebAccess is a browser-based software package for human-machine interfaces HMI, and supervisory control and data acquisition SCADA. It is used to automate complex industrial processes for situations where remote operations are needed.

Vulnerability description

The specialists of the Positive Research center have detected an SQL Injection vulnerability in Advantech WebAccess.

Advantech WebAccess before 8.1 allows remote authenticated users to execute arbitrary SQL commands to modify web server settings, accounts, and projects.

How to fix

Update your software up to the latest version

Advisory status

15.12.2014 - Vendor gets vulnerability details
14.01.2016 - Vendor releases fixed version and details
10.03.2016 - Public disclosure


The vulnerability was detected by Alexey Osipov, Ilya Karpov and Timur Yunusov, Positive Research Center (Positive Technologies Company)


Reports on the vulnerabilities previously discovered by Positive Research:

4G and 5G are not ready for smart cities