CVE-2023-2186
CVSS V2 None
CVSS V3 None
Description
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.
Overview
- CVE ID
- CVE-2023-2186
- Assigner
- trellix
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-06-07T06:37:33.280Z
- Last Modified Date
- 2023-06-07T06:37:33.280Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-2186 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2186 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-24 22:07:25 | Added to TrackCVE |