Vulnerabilities
Vulnerable Software
Advantech:  Security Vulnerabilities
Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users’ browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation.
CVSS Score
4.1
EPSS Score
0.0
Published
2025-06-24
Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.
CVSS Score
5.0
EPSS Score
0.0
Published
2025-06-24
Successful exploitation of the vulnerability could allow an attacker to consume all available session slots and block other users from logging in, thereby preventing legitimate users from gaining access to the product.
CVSS Score
4.2
EPSS Score
0.0
Published
2025-06-24
Successful exploitation of the vulnerability could allow an attacker to intercept data and conduct session hijacking on the exposed data as the vulnerable product uses unencrypted HTTP communication, potentially leading to unauthorised access or data tampering.
CVSS Score
3.1
EPSS Score
0.0
Published
2025-06-24
Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ConfigurationServlet servlet, which listens on TCP port 8080 by default. When parsing the column_value element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17863.
CVSS Score
7.5
EPSS Score
0.005
Published
2024-11-22
Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is closed. Forging requests with a legitimate cookie, even if the session was terminated, allows an unauthorized attacker to act with the same level of privileges of the legitimate user.
CVSS Score
8.0
EPSS Score
0.001
Published
2024-09-27
Advantech ADAM-5630 contains a cross-site request forgery (CSRF) vulnerability. It allows an attacker to partly circumvent the same origin policy, which is designed to prevent different websites from interfering with each other.
CVSS Score
8.0
EPSS Score
0.0
Published
2024-09-27
Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process.
CVSS Score
5.7
EPSS Score
0.0
Published
2024-09-27
Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding.
CVSS Score
5.7
EPSS Score
0.0
Published
2024-09-27
Advantech ADAM 5550's web application includes a "logs" page where all the HTTP requests received are displayed to the user. The device doesn't correctly neutralize malicious code when parsing HTTP requests to generate page output.
CVSS Score
8.8
EPSS Score
0.001
Published
2024-09-27


Contact Us

Shodan ® - All rights reserved