Lucene search

K
cve[email protected]CVE-2023-39458
HistoryMay 03, 2024 - 3:15 a.m.

CVE-2023-39458

2024-05-0303:15:10
CWE-798
web.nvd.nist.gov
23
cve-2023-39458
authentication bypass
ssl certificate
triangle microworks
scada data gateway
network-adjacent attackers
exploit
handling of certificates
zdi-can-20509

5.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.4 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

Triangle MicroWorks SCADA Data Gateway Use of Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of certificates. The service uses a hard-coded default SSL certificate. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20509.

Affected configurations

Vulners
Node
triangle_microworksscada_data_gatewayRange5.1.3.20324

CNA Affected

[
  {
    "vendor": "Triangle MicroWorks",
    "product": "SCADA Data Gateway",
    "versions": [
      {
        "version": "5.1.3.20324",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

5.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.4 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

Related for CVE-2023-39458