PatchSiren cyber security CVE debrief
CVE-2016-9353 Advantech CVE debrief
CVE-2016-9353 affects Advantech SUISAccess Server version 3.0 and earlier. NVD describes the issue as an admin password stored in the system and encrypted with a static key hard-coded into the program, which could let an attacker recover the admin account password for reuse. Because the vulnerability exposes administrative credentials rather than a direct code-execution path, the main security impact is unauthorized administrative access, configuration tampering, and potential disruption of the server or connected environment.
- Vendor
- Advantech
- Product
- CVE-2016-9353
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for Advantech SUISAccess Server deployments should treat this as a credential exposure issue. It is most relevant where the software is installed on systems that could be accessed by local users or other parties with limited privileges, since the CVSS vector indicates a local attack path with low privileges required.
Technical summary
The NVD record lists CVE-2016-9353 for Advantech SUISAccess Server version 3.0 and earlier, with CVSS 3.0 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H and CWE-264. The vulnerability stems from the admin password being stored in the system using encryption keyed by a static value hard-coded into the application. That design means the protected password can be reversed or recovered by an attacker with sufficient access to the software or host, enabling reuse of the administrative account. The supplied references point to an ICS-CERT advisory and a SecurityFocus BID entry for mitigation context.
Defensive priority
High. The combination of administrative credential exposure and high confidentiality/integrity/availability impact makes this important to address wherever the product is deployed, even though the attack path is local and requires some existing access.
Recommended defensive actions
- Identify all hosts running Advantech SUISAccess Server and confirm whether any instance is at version 3.0 or earlier.
- Review the vendor and ICS-CERT advisory references for any available mitigation, update, or configuration guidance.
- Restrict local access to the affected system and limit who can interact with the application files, processes, and host.
- Rotate any administrative credentials that may have been exposed through this flaw.
- Audit the environment for unauthorized administrative logins, configuration changes, or other signs of credential misuse.
- If no remediation is available for the deployed version, plan an upgrade or replacement strategy for the affected installation.
Evidence notes
This debrief is based on the supplied NVD record and its references. NVD states the vulnerable product as Advantech SUISAccess Server version 3.0 and earlier, with the admin password stored using a static hard-coded key. The NVD CVSS vector is CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, and the listed weakness is CWE-264. The supplied references include the ICS-CERT advisory ICSA-16-336-04 and a SecurityFocus BID entry, both treated here as supporting mitigation or advisory context only.
Official resources
-
CVE-2016-9353 CVE record
CVE.org
-
CVE-2016-9353 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Mitigation, Third Party Advisory, US Government Resource
NVD published this CVE on 2017-02-13. The supplied record was last modified on 2026-05-13. No KEV listing was supplied.