Lucene search

K
nvd[email protected]NVD:CVE-2023-39461
HistoryMay 03, 2024 - 3:15 a.m.

CVE-2023-39461

2024-05-0303:15:11
CWE-117
web.nvd.nist.gov
3
remote attackers
arbitrary file write
authentication bypass
event logs
code execution
root context
zdi-can-20535

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N

4.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

Triangle MicroWorks SCADA Data Gateway Event Log Improper Output Neutralization For Logs Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.

The specific flaw exists within the handling of event logs. The issue results from improper sanitization of log output. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-20535.

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N

4.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

Related for NVD:CVE-2023-39461