Логотип exploitDog
bind:CVE-2023-2186
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-2186

Количество 3

Количество 3

nvd логотип

CVE-2023-2186

больше 2 лет назад

On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-gqvf-fxmv-5gj9

больше 2 лет назад

On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.

CVSS3: 8.2
EPSS: Низкий
fstec логотип

BDU:2023-03108

почти 3 года назад

Уязвимость исполняемого файла GTWWebMonitor.exe SCADA-системы SCADA Data Gateway (SDG), позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-2186

On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.

CVSS3: 8.2
0%
Низкий
больше 2 лет назад
github логотип
GHSA-gqvf-fxmv-5gj9

On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.

CVSS3: 8.2
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-03108

Уязвимость исполняемого файла GTWWebMonitor.exe SCADA-системы SCADA Data Gateway (SDG), позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 8.2
0%
Низкий
почти 3 года назад

Уязвимостей на страницу