Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files.
Advisories

No advisories yet.

Fixes

Solution

Advantech recommends users apply the following mitigations and update to WebAccess/SCADA: Version 9.2.2 https://www.advantech.com/en-us/support/details/installation .


Workaround

No workaround given by the vendor.

History

Wed, 31 Dec 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Advantech webaccess\/scada
CPEs cpe:2.3:a:advantech:webaccess\/scada:9.2.1:*:*:*:*:*:*:*
Vendors & Products Advantech webaccess\/scada

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Advantech
Advantech webaccess/scada
Vendors & Products Advantech
Advantech webaccess/scada

Thu, 18 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files.
Title Advantech WebAccess/SCADA Improper Limitation of a Pathname to a Restricted Directory
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-12-18T21:46:52.446Z

Reserved: 2025-12-17T18:59:18.176Z

Link: CVE-2025-14850

cve-icon Vulnrichment

Updated: 2025-12-18T21:03:24.736Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-18T21:15:52.900

Modified: 2025-12-31T19:44:09.080

Link: CVE-2025-14850

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-19T09:15:33Z

Weaknesses