CVE-2016-2275

The web interface on Advantech/B+B SmartWorx VESP211-EU devices with firmware 1.7.2 and VESP211-232 devices with firmware 1.5.1 and 1.7.2 relies on the client to implement access control, which allows remote attackers to perform administrative actions via modified JavaScript code.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-16-049-01 Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-16-049-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:advantech:vesp211-eu:-:*:*:*:*:*:*:*
cpe:2.3:a:advantech:vesp211-eu_firmware:1.7.2:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:h:advantech:vesp211-232:-:*:*:*:*:*:*:*
OR cpe:2.3:a:advantech:vesp211-232_firmware:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:advantech:vesp211-232_firmware:1.7.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () https://ics-cert.us-cert.gov/advisories/ICSA-16-049-01 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-16-049-01 - Third Party Advisory, US Government Resource

Information

Published : 2016-02-21 05:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2275

Mitre link : CVE-2016-2275

CVE.ORG link : CVE-2016-2275


JSON object : View

Products Affected

advantech

  • vesp211-eu
  • vesp211-232
  • vesp211-eu_firmware
  • vesp211-232_firmware
CWE
CWE-284

Improper Access Control