cve/2023/CVE-2023-2187.md

18 lines
1012 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-2187](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2187)
![](https://img.shields.io/static/v1?label=Product&message=SCADA%20Data%20Gateway&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%205.01.03%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%3A%20Missing%20Authentication%20for%20Critical%20function%C2%A0&color=brighgreen)
### Description
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send broadcast events to any user via the WebMonitor.An unauthenticated user can use this vulnerability to forcefully log out of any currently logged-in user by sending a "password change event". Furthermore, an attacker could use this vulnerability to spam the logged-in user with false events.
### POC
#### Reference
- https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html
#### Github
No PoCs found on GitHub currently.