ID

VAR-201606-0247


CVE

CVE-2016-4510


TITLE

Trihedral VTScada Authorization Issue Vulnerability

Trust: 0.8

sources: IVD: 3bc17619-9912-4535-90ec-0ef1dd642360 // CNVD: CNVD-2016-04029

DESCRIPTION

The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to bypass authentication and read arbitrary files via unspecified vectors. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of Wireless Application Protocol requests. The issue lies in the failure to properly validate user-supplied filenames. An attacker can leverage this vulnerability to disclose the contents of arbitrary files under the context of the user running the service. Trihedral VTScada (formerly known as VTS) is a SCADA system based on the Windows platform provided by Trihedral Engineering of Canada. An authorization vulnerability exists in the WAP interface of Trihedral VTScada 8 and pre-December 2.2.0. VTScada is prone to multiple security vulnerabilities. Exploiting these issues will allow attackers to obtain sensitive information, cause denial-of-service conditions or to bypass certain security restrictions and perform unauthorized actions. VTScada versions 8 through 11.2.x are vulnerable

Trust: 3.24

sources: NVD: CVE-2016-4510 // JVNDB: JVNDB-2016-003077 // ZDI: ZDI-16-404 // CNVD: CNVD-2016-04029 // BID: 91077 // IVD: 3bc17619-9912-4535-90ec-0ef1dd642360

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 3bc17619-9912-4535-90ec-0ef1dd642360 // CNVD: CNVD-2016-04029

AFFECTED PRODUCTS

vendor:trihedralmodel:vtscadascope:eqversion:11.1.18

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:11.1.05

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:11.1.16

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:11.1.20

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:8.1.05

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:8.1.06

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:8.0.18

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:8.0.16

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:11.1.17

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:11.1.19

Trust: 1.6

vendor:trihedralmodel:vtscadascope:eqversion:9.1.11

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.17

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.15

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.1.09

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.1.05

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.0.16

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:9.0.03

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:9.1.20

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.1.13

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.20

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.0.17

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.08

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.22

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.21

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.1.07

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:9.1.09

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.1.14

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:8.0.12

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:9.1.14

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:9.1.02

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.0.07

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:9.0.08

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:9.1.03

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.1.10

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.0.14

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:8.0.05

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.1.21

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.14

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:9.1.05

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.1.24

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:9.0.02

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.0.13

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.1.15

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.07

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.11

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.0.11

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.1.12

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.1.06

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.1.06

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.05

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.1.22

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.19

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:10.2.13

Trust: 1.0

vendor:trihedralmodel:vtscadascope:eqversion:11.0.05

Trust: 1.0

vendor:trihedral engineeringmodel:vtscadascope:ltversion:11.x

Trust: 0.8

vendor:trihedral engineeringmodel:vtscadascope:eqversion:8.x from 11.2.02

Trust: 0.8

vendor:trihedral engineeringmodel:vtscadascope: - version: -

Trust: 0.7

vendor:trihedralmodel:vtscadascope:eqversion:8

Trust: 0.6

vendor:trihedralmodel:vtscadascope:ltversion:11.2.02

Trust: 0.6

vendor:vtscadamodel: - scope:eqversion:10.1.05

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.1.06

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.1.07

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.1.12

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.0.11

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.0.13

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.0.14

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.0.16

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.0.17

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.05

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.06

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.09

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.10

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.13

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.14

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.15

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.16

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.17

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.18

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.19

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.20

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.21

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.22

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.1.24

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:8.0.05

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:8.0.12

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:8.0.16

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:8.0.18

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:8.1.05

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:8.1.06

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.05

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.07

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.08

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.11

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.13

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.14

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.15

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.17

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.19

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.20

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.21

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:10.2.22

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.0.02

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.0.03

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.0.08

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.1.02

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.1.03

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.1.05

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.1.09

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.1.11

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.1.14

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:9.1.20

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.0.05

Trust: 0.2

vendor:vtscadamodel: - scope:eqversion:11.0.07

Trust: 0.2

sources: IVD: 3bc17619-9912-4535-90ec-0ef1dd642360 // ZDI: ZDI-16-404 // CNVD: CNVD-2016-04029 // JVNDB: JVNDB-2016-003077 // CNNVD: CNNVD-201606-217 // NVD: CVE-2016-4510

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-4510
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-4510
value: CRITICAL

Trust: 0.8

ZDI: CVE-2016-4510
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2016-04029
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201606-217
value: MEDIUM

Trust: 0.6

IVD: 3bc17619-9912-4535-90ec-0ef1dd642360
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2016-4510
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2016-4510
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2016-04029
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 3bc17619-9912-4535-90ec-0ef1dd642360
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2016-4510
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: IVD: 3bc17619-9912-4535-90ec-0ef1dd642360 // ZDI: ZDI-16-404 // CNVD: CNVD-2016-04029 // JVNDB: JVNDB-2016-003077 // CNNVD: CNNVD-201606-217 // NVD: CVE-2016-4510

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.8

sources: JVNDB: JVNDB-2016-003077 // NVD: CVE-2016-4510

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201606-217

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201606-217

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-003077

PATCH

title:ICS-CERT VTScada Security Announcement (ICSA-16-159-01)url:https://www.trihedral.com/ics-cert-vtscada-security-announcement

Trust: 0.8

title:Trihedral Engineering Ltd has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01

Trust: 0.7

title:Patch for Trihedral VTScada Authorization Issue Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/77533

Trust: 0.6

title:Trihedral VTScada Remediation measures for authorization problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62173

Trust: 0.6

sources: ZDI: ZDI-16-404 // CNVD: CNVD-2016-04029 // JVNDB: JVNDB-2016-003077 // CNNVD: CNNVD-201606-217

EXTERNAL IDS

db:NVDid:CVE-2016-4510

Trust: 4.2

db:ICS CERTid:ICSA-16-159-01

Trust: 3.0

db:ZDIid:ZDI-16-404

Trust: 1.7

db:BIDid:91077

Trust: 1.3

db:CNVDid:CNVD-2016-04029

Trust: 0.8

db:CNNVDid:CNNVD-201606-217

Trust: 0.8

db:JVNDBid:JVNDB-2016-003077

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3512

Trust: 0.7

db:IVDid:3BC17619-9912-4535-90EC-0EF1DD642360

Trust: 0.2

sources: IVD: 3bc17619-9912-4535-90ec-0ef1dd642360 // ZDI: ZDI-16-404 // CNVD: CNVD-2016-04029 // BID: 91077 // JVNDB: JVNDB-2016-003077 // CNNVD: CNNVD-201606-217 // NVD: CVE-2016-4510

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-159-01

Trust: 3.7

url:http://www.zerodayinitiative.com/advisories/zdi-16-404

Trust: 1.0

url:http://www.securityfocus.com/bid/91077

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4510

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4510

Trust: 0.8

url:http://www.trihedral.com/help/#op_welcome/wel_upgradenotes.htm

Trust: 0.6

sources: ZDI: ZDI-16-404 // CNVD: CNVD-2016-04029 // JVNDB: JVNDB-2016-003077 // CNNVD: CNNVD-201606-217 // NVD: CVE-2016-4510

CREDITS

Anonymous

Trust: 1.0

sources: ZDI: ZDI-16-404 // BID: 91077

SOURCES

db:IVDid:3bc17619-9912-4535-90ec-0ef1dd642360
db:ZDIid:ZDI-16-404
db:CNVDid:CNVD-2016-04029
db:BIDid:91077
db:JVNDBid:JVNDB-2016-003077
db:CNNVDid:CNNVD-201606-217
db:NVDid:CVE-2016-4510

LAST UPDATE DATE

2025-04-13T23:21:07.343000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-16-404date:2016-07-01T00:00:00
db:CNVDid:CNVD-2016-04029date:2016-06-15T00:00:00
db:BIDid:91077date:2016-07-06T15:12:00
db:JVNDBid:JVNDB-2016-003077date:2016-06-13T00:00:00
db:CNNVDid:CNNVD-201606-217date:2016-06-12T00:00:00
db:NVDid:CVE-2016-4510date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:3bc17619-9912-4535-90ec-0ef1dd642360date:2016-06-15T00:00:00
db:ZDIid:ZDI-16-404date:2016-07-01T00:00:00
db:CNVDid:CNVD-2016-04029date:2016-06-15T00:00:00
db:BIDid:91077date:2016-06-07T00:00:00
db:JVNDBid:JVNDB-2016-003077date:2016-06-13T00:00:00
db:CNNVDid:CNNVD-201606-217date:2016-06-12T00:00:00
db:NVDid:CVE-2016-4510date:2016-06-09T10:59:03.043