ID

VAR-202308-1259


CVE

CVE-2023-39461


TITLE

Triangle MicroWorks  of  SCADA Data Gateway  Vulnerability related to improper log output disabling in

Trust: 0.8

sources: JVNDB: JVNDB-2023-029203

DESCRIPTION

Triangle MicroWorks SCADA Data Gateway Event Log Improper Output Neutralization For Logs Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of event logs. The issue results from improper sanitization of log output. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-20535

Trust: 2.79

sources: NVD: CVE-2023-39461 // JVNDB: JVNDB-2023-029203 // ZDI: ZDI-23-1029 // CNVD: CNVD-2024-36825

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-36825

AFFECTED PRODUCTS

vendor:triangle microworksmodel:scada data gatewayscope: - version: -

Trust: 1.5

vendor:trianglemicroworksmodel:scada data gatewayscope:eqversion:5.1.3.20324

Trust: 1.0

vendor:triangle microworksmodel:scada data gatewayscope:eqversion:5.1.3.20324

Trust: 0.8

vendor:triangle microworksmodel:scada data gatewayscope:eqversion: -

Trust: 0.8

vendor:trianglemodel:microworks scada data gatewayscope: - version: -

Trust: 0.6

sources: ZDI: ZDI-23-1029 // CNVD: CNVD-2024-36825 // JVNDB: JVNDB-2023-029203 // NVD: CVE-2023-39461

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2023-39461
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2023-029203
value: MEDIUM

Trust: 0.8

ZDI: CVE-2023-39461
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2024-36825
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2024-36825
severity: MEDIUM
baseScore: 4.6
vectorString: AV:N/AC:H/AU:M/C:N/I:C/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: MULTIPLE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 3.2
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2023-39461
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 0.7
impactScore: 3.6
version: 3.0

Trust: 1.0

OTHER: JVNDB-2023-029203
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2023-39461
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 0.7
impactScore: 3.6
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-23-1029 // CNVD: CNVD-2024-36825 // JVNDB: JVNDB-2023-029203 // NVD: CVE-2023-39461

PROBLEMTYPE DATA

problemtype:CWE-117

Trust: 1.0

problemtype:Disabling inappropriate logging (CWE-117) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-029203 // NVD: CVE-2023-39461

PATCH

title:Triangle MicroWorks has issued an update to correct this vulnerability.url:https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new

Trust: 0.7

title:Patch for Triangle MicroWorks SCADA Data Gateway Arbitrary File Write Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/585366

Trust: 0.6

sources: ZDI: ZDI-23-1029 // CNVD: CNVD-2024-36825

EXTERNAL IDS

db:NVDid:CVE-2023-39461

Trust: 3.9

db:ZDIid:ZDI-23-1029

Trust: 2.5

db:JVNDBid:JVNDB-2023-029203

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-20535

Trust: 0.7

db:CNVDid:CNVD-2024-36825

Trust: 0.6

sources: ZDI: ZDI-23-1029 // CNVD: CNVD-2024-36825 // JVNDB: JVNDB-2023-029203 // NVD: CVE-2023-39461

REFERENCES

url:https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new

Trust: 2.5

url:https://www.zerodayinitiative.com/advisories/zdi-23-1029/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-39461

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2023-39461

Trust: 0.6

sources: ZDI: ZDI-23-1029 // CNVD: CNVD-2024-36825 // JVNDB: JVNDB-2023-029203 // NVD: CVE-2023-39461

CREDITS

Claroty Research - Team82 - Uri Katz, Noam Moshe, Vera Mens, Sharon Brizinov

Trust: 0.7

sources: ZDI: ZDI-23-1029

SOURCES

db:ZDIid:ZDI-23-1029
db:CNVDid:CNVD-2024-36825
db:JVNDBid:JVNDB-2023-029203
db:NVDid:CVE-2023-39461

LAST UPDATE DATE

2025-06-20T23:15:17.151000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-23-1029date:2023-08-04T00:00:00
db:CNVDid:CNVD-2024-36825date:2024-08-29T00:00:00
db:JVNDBid:JVNDB-2023-029203date:2025-06-19T06:02:00
db:NVDid:CVE-2023-39461date:2025-06-17T21:03:37.467

SOURCES RELEASE DATE

db:ZDIid:ZDI-23-1029date:2023-08-04T00:00:00
db:CNVDid:CNVD-2024-36825date:2024-08-29T00:00:00
db:JVNDBid:JVNDB-2023-029203date:2025-06-19T00:00:00
db:NVDid:CVE-2023-39461date:2024-05-03T03:15:11.363