{"api_version":"1","generated_at":"2026-04-23T10:40:34+00:00","cve":"CVE-2019-18257","urls":{"html":"https://cve.report/CVE-2019-18257","api":"https://cve.report/api/cve/CVE-2019-18257.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-18257","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-18257"},"summary":{"title":"CVE-2019-18257","description":"In Advantech DiagAnywhere Server, Versions 3.07.11 and prior, multiple stack-based buffer overflow vulnerabilities exist in the file transfer service listening on the TCP port. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code with the privileges of the user running DiagAnywhere Server.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2019-12-17 23:15:00","updated_at":"2020-10-22 17:25:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://www.us-cert.gov/ics/advisories/icsa-19-346-01","name":"https://www.us-cert.gov/ics/advisories/icsa-19-346-01","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"Advantech DiagAnywhere Server | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-18257","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18257","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"18257","vulnerable":"1","versionEndIncluding":"3.07.11","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"advantech","cpe5":"diaganywhere","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2019-18257","ASSIGNER":"ics-cert@hq.dhs.gov","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Advantech DiagAnywhere Server","version":{"version_data":[{"version_value":"Versions 3.07.11 and prior"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"STACK-BASED BUFFER OVERFLOW CWE-121"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.us-cert.gov/ics/advisories/icsa-19-346-01","url":"https://www.us-cert.gov/ics/advisories/icsa-19-346-01"}]},"description":{"description_data":[{"lang":"eng","value":"In Advantech DiagAnywhere Server, Versions 3.07.11 and prior, multiple stack-based buffer overflow vulnerabilities exist in the file transfer service listening on the TCP port. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code with the privileges of the user running DiagAnywhere Server."}]}},"nvd":{"publishedDate":"2019-12-17 23:15:00","lastModifiedDate":"2020-10-22 17:25:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:advantech:diaganywhere:*:*:*:*:*:*:*:*","versionEndIncluding":"3.07.11","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"18257","Ordinal":"158631","Title":"CVE-2019-18257","CVE":"CVE-2019-18257","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"18257","Ordinal":"1","NoteData":"In Advantech DiagAnywhere Server, Versions 3.07.11 and prior, multiple stack-based buffer overflow vulnerabilities exist in the file transfer service listening on the TCP port. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code with the privileges of the user running DiagAnywhere Server.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"18257","Ordinal":"2","NoteData":"2019-12-17","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"18257","Ordinal":"3","NoteData":"2019-12-17","Type":"Other","Title":"Modified"}]}}}