Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14850: CWE-22 in Advantech WebAccess/SCADA

0
High
VulnerabilityCVE-2025-14850cvecve-2025-14850cwe-22
Published: Thu Dec 18 2025 (12/18/2025, 20:30:56 UTC)
Source: CVE Database V5
Vendor/Project: Advantech
Product: WebAccess/SCADA

Description

CVE-2025-14850 is a high-severity directory traversal vulnerability in Advantech WebAccess/SCADA version 9. 2. 1. It allows an attacker with limited privileges to delete arbitrary files on the affected system without user interaction. The vulnerability stems from improper input validation, enabling traversal outside intended directories. Exploitation can lead to significant integrity and availability impacts by removing critical files. Although no known exploits are currently reported in the wild, the vulnerability's network accessibility and low attack complexity make it a serious risk. European organizations using Advantech WebAccess/SCADA in industrial control environments should prioritize patching or applying mitigations. Countries with substantial industrial automation sectors and critical infrastructure relying on this product are at higher risk. Mitigation involves restricting access, applying vendor patches when available, and monitoring file system integrity closely.

AI-Powered Analysis

AILast updated: 12/25/2025, 21:12:21 UTC

Technical Analysis

CVE-2025-14850 is a directory traversal vulnerability classified under CWE-22 affecting Advantech WebAccess/SCADA version 9.2.1. This vulnerability arises due to insufficient validation of user-supplied input in file path parameters, allowing an attacker to traverse directories beyond the intended scope. By exploiting this flaw, an attacker with at least limited privileges (PR:L) can delete arbitrary files on the host system remotely over the network without requiring user interaction (UI:N). The vulnerability impacts the integrity and availability of the system by enabling deletion of critical files, potentially disrupting SCADA operations. The CVSS v3.1 base score is 8.1, reflecting high severity due to network attack vector (AV:N), low attack complexity (AC:L), and the requirement of privileges but no user interaction. Although no exploits are currently known in the wild, the vulnerability poses a significant threat to industrial control systems that rely on WebAccess/SCADA for monitoring and control. The lack of available patches at the time of publication necessitates immediate risk mitigation strategies. Given the critical role of SCADA systems in industrial environments, exploitation could lead to operational downtime, loss of data integrity, and potential safety hazards.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and utilities, this vulnerability could have severe consequences. Exploitation could lead to deletion of configuration files, logs, or operational data, causing system outages or degraded performance. This may disrupt industrial processes, resulting in financial losses, safety risks, and regulatory non-compliance. The integrity and availability of SCADA systems are paramount for continuous operation; thus, this vulnerability threatens operational continuity and could be leveraged in targeted attacks against European industrial environments. Organizations relying on Advantech WebAccess/SCADA version 9.2.1 are particularly vulnerable. The network-based attack vector increases the risk of remote exploitation, potentially by insider threats or external attackers who have gained limited access. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score indicates urgency in addressing the issue.

Mitigation Recommendations

1. Immediately restrict network access to Advantech WebAccess/SCADA systems using firewalls and network segmentation to limit exposure to trusted administrators only. 2. Implement strict access controls and least privilege principles to minimize the number of users with privileges required to exploit this vulnerability. 3. Monitor file system integrity with specialized tools to detect unauthorized file deletions or modifications promptly. 4. Regularly back up critical configuration and operational files to enable rapid recovery in case of file deletion. 5. Engage with Advantech support to obtain and apply official patches or workarounds as soon as they become available. 6. Conduct thorough security audits of SCADA environments to identify and remediate other potential input validation weaknesses. 7. Employ intrusion detection systems (IDS) tuned to detect anomalous file access patterns indicative of directory traversal attempts. 8. Train operational technology (OT) personnel on the risks and signs of exploitation related to this vulnerability to enhance incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-12-17T18:59:18.176Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694466f94eb3efac36a822b7

Added to database: 12/18/2025, 8:41:29 PM

Last enriched: 12/25/2025, 9:12:21 PM

Last updated: 2/5/2026, 8:47:32 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats