CVE-2023-39468

Triangle MicroWorks SCADA Data Gateway DbasSectorFileToExecuteOnReset Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of DbasSectorFileToExecuteOnReset parameter. The issue results from an exposed dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20799.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*

History

17 Jun 2025, 21:02

Type Values Removed Values Added
CPE cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*
References () https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new - () https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new - Release Notes
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1036/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1036/ - Third Party Advisory
First Time Trianglemicroworks
Trianglemicroworks scada Data Gateway

03 May 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 03:15

Updated : 2025-06-17 21:02


NVD link : CVE-2023-39468

Mitre link : CVE-2023-39468


JSON object : View

Products Affected

trianglemicroworks

  • scada_data_gateway
CWE

No CWE.