{"vuid":"VU#114560","idnumber":"114560","name":"IntelliCom NetBiter NB100 and NB200 platforms contain multiple vulnerabilities","keywords":["Netbiter","scada","IntelliCom","NB100","NB200"],"overview":"IntelliCom NetBiter products based on the NB100 and NB200 platforms contain multiple vulnerabilities.","clean_desc":"IntelliCom NetBiter products based on the NB100 and NB200 platforms contain multiple vulnerabilities. A user who has been authenticated at the superadmin level (highest authentication level) has permission to read system files by calling read.cgi with options to read a system file. Local configuration files may be accessed by exploiting a directory traversal vulnerability. This may lead an attacker to research other potential attack vectors. An attacker may also execute arbitrary commands by uploading malicious code. For additional information see ICS-CERT Advisory ICSA-10-316-01A.","impact":"An attacker who is authenticated at the superadmin level exploiting this directory traversal vulnerability could access local configuration files. An attacker may also execute arbitrary commands by uploading malicious code.","resolution":"Apply an update IntelliCom recommends users of WS100/WS200 products apply the \"ISFR-4404-0010.npb” patch.","workarounds":"Restrict Access Enable firewall rules to restrict access to only trusted sources.","sysaffected":"","thanks":"","author":"This document was written by Michael Orlando.","public":["http://archives.neohapsis.com/archives/bugtraq/2010-10/0002.html","http://www.us-cert.gov/control_systems/pdf/ICSA-10-316-01A.pdf","http://support.intellicom.se"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-11-04T18:06:45Z","publicdate":"2010-10-01T00:00:00Z","datefirstpublished":"2011-02-03T18:10:22Z","dateupdated":"2011-02-23T16:43:28Z","revision":29,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"18","cam_population":"17","cam_impact":"16","cam_easeofexploitation":"10","cam_attackeraccessrequired":"1","cam_scorecurrent":"1.683","cam_scorecurrentwidelyknown":"1.938","cam_scorecurrentwidelyknownexploited":"2.958","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.683,"vulnote":null}