First published: Thu Jun 09 2016(Updated: )
The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to bypass authentication and read arbitrary files via unspecified vectors.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Trihedral VTScada | =10.1.05 | |
Trihedral VTScada | =10.1.06 | |
Trihedral VTScada | =10.1.07 | |
Trihedral VTScada | =10.1.12 | |
Trihedral VTScada | =10.0.11 | |
Trihedral VTScada | =10.0.13 | |
Trihedral VTScada | =10.0.14 | |
Trihedral VTScada | =10.0.16 | |
Trihedral VTScada | =10.0.17 | |
Trihedral VTScada | =11.1.05 | |
Trihedral VTScada | =11.1.06 | |
Trihedral VTScada | =11.1.09 | |
Trihedral VTScada | =11.1.10 | |
Trihedral VTScada | =11.1.13 | |
Trihedral VTScada | =11.1.14 | |
Trihedral VTScada | =11.1.15 | |
Trihedral VTScada | =11.1.16 | |
Trihedral VTScada | =11.1.17 | |
Trihedral VTScada | =11.1.18 | |
Trihedral VTScada | =11.1.19 | |
Trihedral VTScada | =11.1.20 | |
Trihedral VTScada | =11.1.21 | |
Trihedral VTScada | =11.1.22 | |
Trihedral VTScada | =11.1.24 | |
Trihedral VTScada | =8.0.05 | |
Trihedral VTScada | =8.0.12 | |
Trihedral VTScada | =8.0.16 | |
Trihedral VTScada | =8.0.18 | |
Trihedral VTScada | =8.1.05 | |
Trihedral VTScada | =8.1.06 | |
Trihedral VTScada | =10.2.05 | |
Trihedral VTScada | =10.2.07 | |
Trihedral VTScada | =10.2.08 | |
Trihedral VTScada | =10.2.11 | |
Trihedral VTScada | =10.2.13 | |
Trihedral VTScada | =10.2.14 | |
Trihedral VTScada | =10.2.15 | |
Trihedral VTScada | =10.2.17 | |
Trihedral VTScada | =10.2.19 | |
Trihedral VTScada | =10.2.20 | |
Trihedral VTScada | =10.2.21 | |
Trihedral VTScada | =10.2.22 | |
Trihedral VTScada | =9.0.02 | |
Trihedral VTScada | =9.0.03 | |
Trihedral VTScada | =9.0.08 | |
Trihedral VTScada | =9.1.02 | |
Trihedral VTScada | =9.1.03 | |
Trihedral VTScada | =9.1.05 | |
Trihedral VTScada | =9.1.09 | |
Trihedral VTScada | =9.1.11 | |
Trihedral VTScada | =9.1.14 | |
Trihedral VTScada | =9.1.20 | |
Trihedral VTScada | =11.0.05 | |
Trihedral VTScada | =11.0.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4510 has a critical severity rating due to its ability to allow remote attackers to bypass authentication.
To mitigate CVE-2016-4510, upgrade to Trihedral VTScada version 11.2.02 or later.
CVE-2016-4510 affects Trihedral VTScada versions 8.x through 11.x, prior to 11.2.02.
CVE-2016-4510 is an authentication bypass vulnerability that allows unauthorized file access.
Yes, CVE-2016-4510 can be exploited remotely without requiring physical access to the system.