First published: Fri May 03 2024(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists due to the lack of user authentication. The issue results from missing authentication in the default system configuration. An attacker can leverage this vulnerability to execute arbitrary code in the context of root.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trianglemicroworks SCADA Data Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39457 has been classified as critical due to its ability to allow remote attackers to bypass authentication.
To mitigate CVE-2023-39457, update the Triangle MicroWorks SCADA Data Gateway to the latest version that includes authentication patches.
CVE-2023-39457 affects installations of the Triangle MicroWorks SCADA Data Gateway that do not implement proper user authentication.
Yes, CVE-2023-39457 can be exploited remotely because authentication is not required to access the vulnerable systems.
Exploitation of CVE-2023-39457 can lead to unauthorized access and control over the affected SCADA systems.