Plattform
other
Komponente
scada-data-gateway
Behoben in
5.1.4
CVE-2023-39460 describes a Directory Traversal vulnerability within the Triangle MicroWorks SCADA Data Gateway. This flaw allows remote attackers to create arbitrary files on affected systems, potentially leading to system compromise and data manipulation. The vulnerability impacts versions 5.1.3.20324–5.1.3.20324. A fix is expected from the vendor.
The Directory Traversal vulnerability in SCADA Data Gateway allows an attacker to bypass authentication and create files anywhere on the system the process has write access. This could involve overwriting critical configuration files, injecting malicious code, or creating backdoor accounts. Successful exploitation could lead to complete system compromise, data exfiltration, and disruption of industrial control processes. The ability to bypass authentication significantly increases the risk, as it removes a key security barrier. While the description mentions the need for authentication, the bypass capability makes this a serious concern.
CVE-2023-39460 was publicly disclosed on 2024-05-03. The vulnerability's severity is rated HIGH (CVSS 7.2). Currently, there are no publicly available proof-of-concept exploits. It is not listed on the CISA KEV catalog as of this writing. Given the potential for significant impact on industrial control systems, organizations using SCADA Data Gateway should prioritize patching or implementing mitigations.
Organizations utilizing Triangle MicroWorks SCADA Data Gateway in industrial control systems are at risk. This includes critical infrastructure sectors such as energy, water, and manufacturing. Systems with legacy configurations or those lacking robust access controls are particularly vulnerable. Shared hosting environments where multiple users share the same SCADA Data Gateway instance also face increased risk.
• linux / server: Monitor system logs (journalctl) for unusual file creation events in unexpected directories. Use auditd to track file access attempts.
auditctl -w /path/to/sensitive/directory -p wa -k directory_traversal• generic web: Use curl to probe for directory traversal attempts.
curl 'http://scada-gateway/../../../../etc/passwd'• windows / supply-chain: Monitor PowerShell logs for suspicious commands involving file creation or modification. Check Autoruns for unusual entries that could be related to the vulnerability.
disclosure
Exploit-Status
EPSS
1.06% (78% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to upgrade to a patched version of the SCADA Data Gateway as soon as it becomes available from Triangle MicroWorks. Until a patch is applied, implement temporary mitigations. Configure a Web Application Firewall (WAF) to block requests containing suspicious path traversal sequences (e.g., '../'). Implement strict file access controls, limiting the write permissions of the SCADA Data Gateway process to the absolute minimum required. Regularly review and audit file system access logs for any unauthorized file creation attempts. Consider implementing intrusion detection system (IDS) rules to detect unusual file creation activity.
Actualizar Triangle MicroWorks SCADA Data Gateway a una versión posterior a 5.1.3.20324 que solucione la vulnerabilidad de path traversal. Consultar el sitio web del proveedor para obtener la última versión y las instrucciones de actualización.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2023-39460 is a Directory Traversal vulnerability affecting Triangle MicroWorks SCADA Data Gateway versions 5.1.3.20324–5.1.3.20324, allowing attackers to create arbitrary files.
If you are running Triangle MicroWorks SCADA Data Gateway version 5.1.3.20324–5.1.3.20324, you are potentially affected by this vulnerability.
Upgrade to a patched version of the SCADA Data Gateway as soon as it becomes available. Until then, implement WAF rules and restrict access.
Active exploitation is not currently confirmed, but the vulnerability's nature suggests potential for exploitation.
Refer to the Triangle MicroWorks website or security advisories for updates and official guidance regarding CVE-2023-39460.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.