First published: Fri Aug 04 2023(Updated: )
This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
Affected Software | Affected Version | How to fix |
---|---|---|
Trianglemicroworks SCADA Data Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ZDI-23-1029 is classified as critical due to its ability for remote attackers to write arbitrary files.
To mitigate ZDI-23-1029, update to the latest version of Triangle MicroWorks SCADA Data Gateway following the vendor's security guidance.
The impact of ZDI-23-1029 includes unauthorized file access and potential system compromise due to bypassing authentication.
All installations of Triangle MicroWorks SCADA Data Gateway that have not implemented the latest security patches are affected by ZDI-23-1029.
Yes, authentication is required to exploit ZDI-23-1029, but the authentication mechanism can be bypassed.