First published: Wed Jun 07 2023(Updated: )
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send broadcast events to any user via the WebMonitor.An unauthenticated user can use this vulnerability to forcefully log out of any currently logged-in user by sending a "password change event". Furthermore, an attacker could use this vulnerability to spam the logged-in user with false events.
Credit: trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Triangle MicroWorks SCADA Data Gateway | <=5.01.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2187 is classified as a high severity vulnerability due to its potential for unauthorized user session disruption.
To mitigate CVE-2023-2187, upgrade Triangle MicroWorks' SCADA Data Gateway to version 5.01.04 or later.
CVE-2023-2187 affects users of Triangle MicroWorks' SCADA Data Gateway versions 5.01.03 and earlier.
An attacker can exploit CVE-2023-2187 to forcefully log out any currently logged-in user by sending a password change event.
No, CVE-2023-2187 can be exploited by unauthenticated users.