Skip to content

Commit

Permalink
Update 20240322003-Advantech-SQL-Injection-Vulnerability.md
Browse files Browse the repository at this point in the history
  • Loading branch information
adonm authored Mar 23, 2024
1 parent 984109a commit 44f717e
Showing 1 changed file with 2 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Overview

There is a SQL Injection vulnerability in Advantech's WebAccess/SCDA software that allows an authenticated attacker to remotely inject SQL code on the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.
There is a SQL Injection vulnerability in Advantech's WebAccess/SCaDA software that allows an authenticated attacker to remotely inject SQL code on the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.

## What is vulnerable?

Expand All @@ -18,4 +18,4 @@ There is no evidence of exploitation affecting Western Australian Government net

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)):

- https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01
- <https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01>

0 comments on commit 44f717e

Please sign in to comment.