First published: Fri May 03 2024(Updated: )
This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of event logs. The issue results from improper sanitization of log output. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Triangle MicroWorks SCADA Data Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39461 affects Triangle MicroWorks SCADA Data Gateway installations.
The severity of CVE-2023-39461 is considered critical due to its potential for arbitrary file writing.
Exploitation of CVE-2023-39461 requires authentication, but the existing authentication can be bypassed.
Triangle MicroWorks has provided guidance on mitigating CVE-2023-39461; please check their updates.
Successful exploitation of CVE-2023-39461 could allow attackers to write arbitrary files, compromising the system's integrity.