First published: Fri May 03 2024(Updated: )
This vulnerability allows remote attackers to upload arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the processing of workspace files. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this in conjunction with other vulnerabilitites to execute arbitrary code in the context of root.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trianglemicroworks SCADA Data Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39462 has a medium severity rating due to its potential impact on system integrity.
To fix CVE-2023-39462, ensure your SCADA Data Gateway is updated to the latest security patch provided by Triangle MicroWorks.
CVE-2023-39462 affects users of Triangle MicroWorks SCADA Data Gateway with vulnerable installations.
Yes, CVE-2023-39462 can be exploited remotely by authenticated attackers who bypass authentication mechanisms.
CVE-2023-39462 allows remote attackers to upload arbitrary files to affected systems.