First published: Fri May 03 2024(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists within the get_config endpoint. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose sensitive information.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Triangle MicroWorks SCADA Data Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39466 has a high severity rating due to its potential for remote exploitation without authentication.
To fix CVE-2023-39466, apply the latest security patch provided by Triangle MicroWorks for SCADA Data Gateway.
CVE-2023-39466 can potentially disclose sensitive configuration and operational information from the affected SCADA Data Gateway.
No, CVE-2023-39466 does not require authentication, making it more dangerous for affected installations.
CVE-2023-39466 affects specific versions of Triangle MicroWorks SCADA Data Gateway, details of which can be found in the vendor's advisories.