Vulnerability Details : CVE-2023-39462
Triangle MicroWorks SCADA Data Gateway Workspace Unrestricted Upload Vulnerability. This vulnerability allows remote attackers to upload arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the processing of workspace files. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this in conjunction with other vulnerabilitites to execute arbitrary code in the context of root. Was ZDI-CAN-20536.
Vulnerability category: Execute code
Products affected by CVE-2023-39462
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-39462
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 16 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39462
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
Zero Day Initiative | 2024-05-03 |
CWE ids for CVE-2023-39462
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: zdi-disclosures@trendmicro.com (Secondary)
References for CVE-2023-39462
-
https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new
SCADA Data Gateway - What's New
-
https://www.zerodayinitiative.com/advisories/ZDI-23-1030/
ZDI-23-1030 | Zero Day Initiative
Jump to