PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9353 Advantech CVE debrief

CVE-2016-9353 affects Advantech SUISAccess Server version 3.0 and earlier. NVD describes the issue as an admin password stored in the system and encrypted with a static key hard-coded into the program, which could let an attacker recover the admin account password for reuse. Because the vulnerability exposes administrative credentials rather than a direct code-execution path, the main security impact is unauthorized administrative access, configuration tampering, and potential disruption of the server or connected environment.

Vendor
Advantech
Product
CVE-2016-9353
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-13
Original CVE updated
2026-05-13
Advisory published
2017-02-13
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for Advantech SUISAccess Server deployments should treat this as a credential exposure issue. It is most relevant where the software is installed on systems that could be accessed by local users or other parties with limited privileges, since the CVSS vector indicates a local attack path with low privileges required.

Technical summary

The NVD record lists CVE-2016-9353 for Advantech SUISAccess Server version 3.0 and earlier, with CVSS 3.0 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H and CWE-264. The vulnerability stems from the admin password being stored in the system using encryption keyed by a static value hard-coded into the application. That design means the protected password can be reversed or recovered by an attacker with sufficient access to the software or host, enabling reuse of the administrative account. The supplied references point to an ICS-CERT advisory and a SecurityFocus BID entry for mitigation context.

Defensive priority

High. The combination of administrative credential exposure and high confidentiality/integrity/availability impact makes this important to address wherever the product is deployed, even though the attack path is local and requires some existing access.

Recommended defensive actions

  • Identify all hosts running Advantech SUISAccess Server and confirm whether any instance is at version 3.0 or earlier.
  • Review the vendor and ICS-CERT advisory references for any available mitigation, update, or configuration guidance.
  • Restrict local access to the affected system and limit who can interact with the application files, processes, and host.
  • Rotate any administrative credentials that may have been exposed through this flaw.
  • Audit the environment for unauthorized administrative logins, configuration changes, or other signs of credential misuse.
  • If no remediation is available for the deployed version, plan an upgrade or replacement strategy for the affected installation.

Evidence notes

This debrief is based on the supplied NVD record and its references. NVD states the vulnerable product as Advantech SUISAccess Server version 3.0 and earlier, with the admin password stored using a static hard-coded key. The NVD CVSS vector is CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, and the listed weakness is CWE-264. The supplied references include the ICS-CERT advisory ICSA-16-336-04 and a SecurityFocus BID entry, both treated here as supporting mitigation or advisory context only.

Official resources

NVD published this CVE on 2017-02-13. The supplied record was last modified on 2026-05-13. No KEV listing was supplied.