CVE-2023-39458

Triangle MicroWorks SCADA Data Gateway Use of Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of certificates. The service uses a hard-coded default SSL certificate. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20509.
Configurations

No configuration.

History

21 Nov 2024, 08:15

Type Values Removed Values Added
References () https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new - () https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new -
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1026/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1026/ -
Summary
  • (es) Vulnerabilidad de omisión de autenticación de credenciales codificadas mediante el uso de la puerta de enlace de datos SCADA de Triangle MicroWorks. Esta vulnerabilidad permite a atacantes adyacentes a la red eludir la autenticación en las instalaciones afectadas de Triangle MicroWorks SCADA Data Gateway. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe en el manejo de certificados. El servicio utiliza un certificado SSL predeterminado codificado. Un atacante puede aprovechar esta vulnerabilidad para eludir la autenticación en el sistema. Era ZDI-CAN-20509.

03 May 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 03:15

Updated : 2024-11-21 08:15


NVD link : CVE-2023-39458

Mitre link : CVE-2023-39458

CVE.ORG link : CVE-2023-39458


JSON object : View

Products Affected

No product.

CWE
CWE-798

Use of Hard-coded Credentials