First published: Fri May 03 2024(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of certificate web directory. The issue results from the exposure of sensitive information in the application webroot. An attacker can leverage this vulnerability to disclose sensitive information.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trianglemicroworks SCADA Data Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39467 has a high severity level, as it allows remote attackers to disclose sensitive information without authentication.
To fix CVE-2023-39467, update to the latest version of Triangle MicroWorks SCADA Data Gateway that addresses this vulnerability.
CVE-2023-39467 can potentially disclose sensitive configuration data that may compromise the security of the installation.
Users of the Triangle MicroWorks SCADA Data Gateway are affected by CVE-2023-39467.
No, authentication is not required to exploit CVE-2023-39467, making it easier for attackers.