7.5
CVSSv3

CVE-2016-9349

Published: 13/02/2017 Updated: 12/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 510
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An issue exists in Advantech SUISAccess Server Version 3.0 and prior. An attacker could traverse the file system and extract files that can result in information disclosure.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

advantech susiaccess

Exploits

require 'msf/core' class MetasploitModule < Msf::Auxiliary Rank = GreatRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Advantech SUSIAccess Server Directory Traversal Information Disclosure', 'Description' => %q{ This module exploits an information ...
#! /usr/bin/env ruby =begin Exploit Title: Advantech SUSIAccess RecoveryMgmt File Upload Date: 07/31/17 Exploit Author: james fitts Vendor Homepage: wwwadvantechcom/ Version: Advantech SUSIAccess <= 30 Tested on: Windows 7 SP1 Relavant Advisories: ZDI-16-630 ZDI-16-628 CVE-2016-9349 CVE-2016-9351 BID-94629 ICSA-16-336-04 Notes ...
Advantech SUSIAccess versions 30 and below suffers from a RecoveryMgmt file upload vulnerability ...

Github Repositories

CVE-PoC-Finder This is simple golang script which fetch CVE data from the apiexploitobserver/?keyword=CVE-XXXX-XXXX Usage  go run cvePoCgo -cve CVE-2016-9349 or go run cvePoCgo -cve grafana Output: Description: Exploit Observer has 5 entries in 4 file formats related to CVE-2016