SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-409202229] Navis WebAccess SQL Injection Vulnerability

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2016-08-18OtherNavis?bRpsdN/ACVE-2016-5817 N/AN/AN/A


# Navis WebAccess SQL Injection Vulnerability


This advisory is a follow-up to the original alert, titled ICS-ALERT-16-231-01 Navis WebAccess SQL Injection Vulnerability,a published August 17, 2016, on the NCCIC/ICS‑CERT web site.
ICS-CERT is aware of a public report of an SQL Injection vulnerability with proof-of-concept (PoC) exploit code affecting the Navis WebAccess application. This report was released by "śbRpsd"ť without coordination with either the vendor or ICS-CERT. ICS-CERT has reached out to Navis who has validated the reported vulnerability. Navis has produced custom patches to mitigate this vulnerability.
This vulnerability could be exploited remotely.
Exploits that target this vulnerability are known to be publicly available.


The following WebAccess versions are affected:
Navis WebAccess, all versions released prior to August 10, 2016.


Successful exploitation of the vulnerability may allow a remote attacker to compromise the confidentiality, integrity, and availablility of the SQL database.
Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.


Navis, a subsidiary of Cargotec Corporation, is a United States-based company that has customers worldwide.
The affected product, WebAccess, is a web-based application that provides the operator and its constituents with real-time, online access to operational logistics information. According to Navis, WebAccess application is deployed across the Transportation sector. Navis estimates that these products are used worldwide.



The WebAccess application does not properly sanitize input that may allow a remote attacker to read, modify, and affect availability of data in the SQL database.
CVE-2016-5817c has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)



This vulnerability could be exploited remotely.


Exploits that target this vulnerability are publicly available.


An attacker with low skill would be able to exploit this vulnerability.


Navis reports that they have released custom patches on August 10, 2016, for the Navis WebAccess application, which is a legacy product that is in use by thirteen customers around the world, five of which are in the United States
The SQL injection vulnerability, which targeted publicly available news-pages in the application, was brought to Navis’ attention on August 9, 2016
Navis reports that they have contacted all their affected customers and that all customers in the United States have implemented the fix.
Navis recommends that all Navis WebAccess users should install the available patch as soon as possible.
In the event a Navis customer has questions regarding this issue, they are encouraged to contact customer support through the Navis Collaboration Portal at