Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

WebAccess/SCADA SQL Injection

March 21, 2024
Reading Time: 3 mins read
in Alerts
WebAccess/SCADA SQL Injection

The recent discovery of a SQL injection vulnerability in Advantech’s WebAccess/SCADA software has emphasized the critical need for organizations to take immediate action in mitigating this cyber threat. The vulnerability is characterized by a CVSS v4 score of 7.1, indicating that it is exploitable remotely, with low attack complexity, and public exploits are readily available. This substantial risk exposes an authenticated attacker to the potential to read or modify a remote database. The affected versions of the browser-based SCADA software are identified as WebAccess/SCADA: Version 9.1.5U.

The SQL injection vulnerability in Advantech’s WebAccess/SCADA software allows an authenticated attacker to remotely inject SQL code into the database, facilitating unauthorized access or manipulation of critical data. The severity of the vulnerability is evident with the assignment of CVE-2024-2453, with a calculated base score of 7.1 in CVSS v4. The critical infrastructure sectors impacted by this vulnerability include critical manufacturing, energy, water, and wastewater systems in East Asia, Europe, and the United States, with Advantech’s headquarters located in Taiwan. The discovery of a public Proof of Concept (PoC) authored by Prześlij Komentarz further emphasizes the urgency for organizations to address this threat promptly.

Mitigating measures recommended by Advantech include updating to WebAccess/SCADA version 9.1.6 or higher. Additionally, the Cybersecurity and Infrastructure Security Agency (CISA) advises users to implement defensive measures to minimize the risk of exploitation. This includes minimizing network exposure, employing firewalls to isolate control system networks, and utilizing secure remote access methods such as Virtual Private Networks (VPNs). Organizations are encouraged to perform proper impact analysis and risk assessment prior to deploying these defensive measures. CISA further encourages the implementation of recommended cybersecurity strategies for proactive defense of industrial control system (ICS) assets.

Reference:
  • Critical SQL Injection Vulnerability in Advantech’s WebAccess/SCADA

Tags: AdvantechCyber AlertCyber Alerts 2024Cyber RiskCyber threatMarch 2024SQL injectionVulnerabilitiesWebAccess/SCADA
ADVERTISEMENT

Related Posts

AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025
hpingbot Botnet Uses Pastebin C2 Channel

APT36 Targets Indian Defense Linux Systems

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

hpingbot Botnet Uses Pastebin C2 Channel

July 7, 2025

Latest Alerts

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

APT36 Targets Indian Defense Linux Systems

hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

Subscribe to our newsletter

    Latest Incidents

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    Ransomware Attack Causes Outage at Ingram

    Call of Duty Players Hacked on Game Pass

    RansomHub Claims Theft of Coppell City Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial