CVE-2023-2187
https://notcve.org/view.php?id=CVE-2023-2187
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send broadcast events to any user via the WebMonitor.An unauthenticated user can use this vulnerability to forcefully log out of any currently logged-in user by sending a "password change event". Furthermore, an attacker could use this vulnerability to spam the logged-in user with false events. • https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html • CWE-306: Missing Authentication for Critical Function •
CVE-2023-2186
https://notcve.org/view.php?id=CVE-2023-2186
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution. • https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html • CWE-134: Use of Externally-Controlled Format String •
CVE-2020-10611 – Triangle MicroWorks SCADA Data Gateway DNP3 Type Confusion Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-10611
Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 allows remote attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type confusion condition. Authentication is not required to exploit this vulnerability. Only applicable to installations using DNP3 Data Sets. Triangle MicroWorks SCADA Data Gateway versiones 3.02.0697 hasta 4.0.122, versiones 2.41.0213 hasta 4.0.122, permite a atacantes remotos ejecutar código arbitrario debido a la falta de comprobación apropiada de los datos suministrados por el usuario, lo que puede causar una condición de confusión de tipos. No es requerida una autenticación para explotar esta vulnerabilidad. • https://www.us-cert.gov/ics/advisories/icsa-20-105-03 https://www.zerodayinitiative.com/advisories/ZDI-20-549 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2020-10613 – Triangle MicroWorks SCADA Data Gateway DNP3 Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2020-10613
Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 allows remote attackers to disclose sensitive information due to the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. Authentication is not required to exploit this vulnerability. Only applicable to installations using DNP3 Data Sets. Triangle MicroWorks SCADA Data Gateway versiones 3.02.0697 hasta 4.0.122, versiones 2.41.0213 hasta 4.0.122, permite a atacantes remotos divulgar información confidencial debido a la falta de comprobación apropiada de los datos suministrados por el usuario, lo que puede resultar en una lectura más allá del final de una estructura asignada. No es requerida una autenticación para explotar esta vulnerabilidad. • https://www.us-cert.gov/ics/advisories/icsa-20-105-03 https://www.zerodayinitiative.com/advisories/ZDI-20-548 • CWE-125: Out-of-bounds Read •
CVE-2020-10615 – Triangle Microworks SCADA Data Gateway DNP3 GET_FILE_INFO Stack-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-10615
Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 allows remote attackers cause a denial-of-service condition due to a lack of proper validation of the length of user-supplied data, prior to copying it to a fixed-length stack-based buffer. Authentication is not required to exploit this vulnerability. Triangle MicroWorks SCADA Data Gateway versiones 3.02.0697 hasta 4.0.122, versiones 2.41.0213 hasta 4.0.122, permite a atacantes remotos causar una condición de denegación de servicio debido a la falta de una comprobación apropiada de la longitud de datos suministrados por el usuario, antes de copiar en un búfer en la región stack de la memoria de longitud fija. No es requerida una autenticación para explotar esta vulnerabilidad. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle Microworks SCADA Data Gateway. • https://www.us-cert.gov/ics/advisories/icsa-20-105-03 https://www.zerodayinitiative.com/advisories/ZDI-20-547 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •