First published: Fri May 03 2024(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of certificates. The service uses a hard-coded default SSL certificate. An attacker can leverage this vulnerability to bypass authentication on the system.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Triangle MicroWorks SCADA Data Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39458 is considered a high-severity vulnerability due to its ability to allow unauthorized access to the SCADA Data Gateway.
To fix CVE-2023-39458, update the Triangle MicroWorks SCADA Data Gateway to the latest version provided by the vendor.
CVE-2023-39458 affects installations of Triangle MicroWorks SCADA Data Gateway that have not implemented additional security measures.
With CVE-2023-39458, attackers can bypass authentication and potentially access or manipulate the system without proper credentials.
No, authentication is not required to exploit CVE-2023-39458, making it particularly dangerous for affected systems.