Lucene search

K
cve[email protected]CVE-2023-39461
HistoryMay 03, 2024 - 3:15 a.m.

CVE-2023-39461

2024-05-0303:15:11
CWE-117
web.nvd.nist.gov
25
scada
data gateway
event log
arbitrary file write
vulnerability
authentication bypass
root execution

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N

5 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

Triangle MicroWorks SCADA Data Gateway Event Log Improper Output Neutralization For Logs Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.

The specific flaw exists within the handling of event logs. The issue results from improper sanitization of log output. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-20535.

Affected configurations

Vulners
Node
triangle_microworksscada_data_gatewayRange5.1.3.20324

CNA Affected

[
  {
    "vendor": "Triangle MicroWorks",
    "product": "SCADA Data Gateway",
    "versions": [
      {
        "version": "5.1.3.20324",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N

5 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

Related for CVE-2023-39461