On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send broadcast events to any user via the WebMonitor.An unauthenticated user can use this vulnerability to forcefully log out of any currently logged-in user by sending a "password change event". Furthermore, an attacker could use this vulnerability to spam the logged-in user with false events.
References
| Link | Resource |
|---|---|
| https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html | Third Party Advisory |
Configurations
History
16 Jun 2023, 18:06
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| References | (MISC) https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html - Third Party Advisory | |
| CPE | cpe:2.3:a:trianglemicroworks:scada_data_gateway:*:*:*:*:*:*:*:* | |
| First Time |
Trianglemicroworks scada Data Gateway
Trianglemicroworks |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
07 Jun 2023, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-06-07 07:15
Updated : 2023-06-16 18:06
NVD link : CVE-2023-2187
Mitre link : CVE-2023-2187
JSON object : View
Products Affected
trianglemicroworks
- scada_data_gateway
CWE
