First published: Thu Jun 09 2016(Updated: )
The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via unspecified vectors.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Trihedral VTScada | =9.0.02 | |
Trihedral VTScada | =9.0.03 | |
Trihedral VTScada | =9.0.08 | |
Trihedral VTScada | =9.1.02 | |
Trihedral VTScada | =9.1.03 | |
Trihedral VTScada | =9.1.05 | |
Trihedral VTScada | =9.1.09 | |
Trihedral VTScada | =9.1.11 | |
Trihedral VTScada | =9.1.14 | |
Trihedral VTScada | =9.1.20 | |
Trihedral VTScada | =11.0.05 | |
Trihedral VTScada | =11.0.07 | |
Trihedral VTScada | =10.0.11 | |
Trihedral VTScada | =10.0.13 | |
Trihedral VTScada | =10.0.14 | |
Trihedral VTScada | =10.0.16 | |
Trihedral VTScada | =10.0.17 | |
Trihedral VTScada | =10.1.05 | |
Trihedral VTScada | =10.1.06 | |
Trihedral VTScada | =10.1.07 | |
Trihedral VTScada | =10.1.12 | |
Trihedral VTScada | =10.2.05 | |
Trihedral VTScada | =10.2.07 | |
Trihedral VTScada | =10.2.08 | |
Trihedral VTScada | =10.2.11 | |
Trihedral VTScada | =10.2.13 | |
Trihedral VTScada | =10.2.14 | |
Trihedral VTScada | =10.2.15 | |
Trihedral VTScada | =10.2.17 | |
Trihedral VTScada | =10.2.19 | |
Trihedral VTScada | =10.2.20 | |
Trihedral VTScada | =10.2.21 | |
Trihedral VTScada | =10.2.22 | |
Trihedral VTScada | =8.0.05 | |
Trihedral VTScada | =8.0.12 | |
Trihedral VTScada | =8.0.16 | |
Trihedral VTScada | =8.0.18 | |
Trihedral VTScada | =8.1.05 | |
Trihedral VTScada | =8.1.06 | |
Trihedral VTScada | =11.1.05 | |
Trihedral VTScada | =11.1.06 | |
Trihedral VTScada | =11.1.09 | |
Trihedral VTScada | =11.1.10 | |
Trihedral VTScada | =11.1.13 | |
Trihedral VTScada | =11.1.14 | |
Trihedral VTScada | =11.1.15 | |
Trihedral VTScada | =11.1.16 | |
Trihedral VTScada | =11.1.17 | |
Trihedral VTScada | =11.1.18 | |
Trihedral VTScada | =11.1.19 | |
Trihedral VTScada | =11.1.20 | |
Trihedral VTScada | =11.1.21 | |
Trihedral VTScada | =11.1.22 | |
Trihedral VTScada | =11.1.24 | |
Trihedral VTScada | >=8.0.05<11.2.02 | |
Trihedral VTScada (formerly VTS) | ||
>=8.0.05<11.2.02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4523 has a CVSS score that indicates a denial of service vulnerability, potentially impacting the availability of the application.
To mitigate CVE-2016-4523, you should update to Trihedral VTScada version 11.2.02 or later.
CVE-2016-4523 affects Trihedral VTScada versions from 8.x up to (but not including) 11.2.02.
CVE-2016-4523 is classified as a denial of service vulnerability that can cause an application crash.
Yes, CVE-2016-4523 allows remote attackers to exploit the vulnerability through the WAP interface.