Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-196-01 Third Party Advisory US Government Resource
https://www.zerodayinitiative.com/advisories/ZDI-20-827/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-828/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-830/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-832/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-833/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-835/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-836/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-837/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-838/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-839/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-842/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-843/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-844/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-845/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-846/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-847/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-848/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-849/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-850/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-851/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-852/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-853/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-854/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-855/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-856/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-857/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-858/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-860/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-861/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-862/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-863/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-864/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-865/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-866/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-868/ Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-869/ Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2020-07-15T01:50:54

Updated: 2020-07-16T17:06:49

Reserved: 2020-06-19T00:00:00


Link: CVE-2020-14497

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-07-15T02:15:12.547

Modified: 2020-07-21T20:34:07.950


Link: CVE-2020-14497

JSON object: View

cve-icon Redhat Information

No data.

CWE