ID

VAR-202308-1260


CVE

CVE-2023-39460


TITLE

Triangle MicroWorks  of  SCADA Data Gateway  Past traversal vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-029215

DESCRIPTION

Triangle MicroWorks SCADA Data Gateway Event Log Directory Traversal Arbitrary File Creation Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the creation of event logs. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-20534. (DoS) It may be in a state. Triangle MicroWorks SCADA Data Gateway is a SCADA data gateway product of Triangle MicroWorks in the United States

Trust: 2.88

sources: NVD: CVE-2023-39460 // JVNDB: JVNDB-2023-029215 // ZDI: ZDI-23-1028 // CNVD: CNVD-2025-08347 // VULMON: CVE-2023-39460

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-08347

AFFECTED PRODUCTS

vendor:triangle microworksmodel:scada data gatewayscope: - version: -

Trust: 1.5

vendor:trianglemicroworksmodel:scada data gatewayscope:eqversion:5.1.3.20324

Trust: 1.0

vendor:triangle microworksmodel:scada data gatewayscope:eqversion: -

Trust: 0.8

vendor:triangle microworksmodel:scada data gatewayscope:eqversion:5.1.3.20324

Trust: 0.8

vendor:trianglemodel:microworks scada data gatewayscope: - version: -

Trust: 0.6

sources: ZDI: ZDI-23-1028 // CNVD: CNVD-2025-08347 // JVNDB: JVNDB-2023-029215 // NVD: CVE-2023-39460

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2023-39460
value: HIGH

Trust: 1.0

OTHER: JVNDB-2023-029215
value: HIGH

Trust: 0.8

ZDI: CVE-2023-39460
value: HIGH

Trust: 0.7

CNVD: CNVD-2025-08347
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-08347
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2023-39460
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.0

OTHER: JVNDB-2023-029215
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2023-39460
baseSeverity: HIGH
baseScore: 7.2
vectorString: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-23-1028 // CNVD: CNVD-2025-08347 // JVNDB: JVNDB-2023-029215 // NVD: CVE-2023-39460

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.0

problemtype:Path traversal (CWE-22) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-029215 // NVD: CVE-2023-39460

PATCH

title:Triangle MicroWorks has issued an update to correct this vulnerability.url:https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new

Trust: 0.7

title:Patch for Triangle MicroWorks SCADA Data Gateway Arbitrary File Creation Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/682386

Trust: 0.6

sources: ZDI: ZDI-23-1028 // CNVD: CNVD-2025-08347

EXTERNAL IDS

db:NVDid:CVE-2023-39460

Trust: 4.0

db:ZDIid:ZDI-23-1028

Trust: 2.6

db:JVNDBid:JVNDB-2023-029215

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-20534

Trust: 0.7

db:CNVDid:CNVD-2025-08347

Trust: 0.6

db:VULMONid:CVE-2023-39460

Trust: 0.1

sources: ZDI: ZDI-23-1028 // CNVD: CNVD-2025-08347 // VULMON: CVE-2023-39460 // JVNDB: JVNDB-2023-029215 // NVD: CVE-2023-39460

REFERENCES

url:https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new

Trust: 2.5

url:https://www.zerodayinitiative.com/advisories/zdi-23-1028/

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2023-39460

Trust: 1.4

sources: ZDI: ZDI-23-1028 // CNVD: CNVD-2025-08347 // VULMON: CVE-2023-39460 // JVNDB: JVNDB-2023-029215 // NVD: CVE-2023-39460

CREDITS

Claroty Research - Team82 - Uri Katz, Noam Moshe, Vera Mens, Sharon Brizinov

Trust: 0.7

sources: ZDI: ZDI-23-1028

SOURCES

db:ZDIid:ZDI-23-1028
db:CNVDid:CNVD-2025-08347
db:VULMONid:CVE-2023-39460
db:JVNDBid:JVNDB-2023-029215
db:NVDid:CVE-2023-39460

LAST UPDATE DATE

2025-06-21T23:39:23.489000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-23-1028date:2023-08-04T00:00:00
db:CNVDid:CNVD-2025-08347date:2025-04-25T00:00:00
db:JVNDBid:JVNDB-2023-029215date:2025-06-20T07:38:00
db:NVDid:CVE-2023-39460date:2025-06-17T21:03:41

SOURCES RELEASE DATE

db:ZDIid:ZDI-23-1028date:2023-08-04T00:00:00
db:CNVDid:CNVD-2025-08347date:2025-04-23T00:00:00
db:JVNDBid:JVNDB-2023-029215date:2025-06-20T00:00:00
db:NVDid:CVE-2023-39460date:2024-05-03T03:15:11.157