On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: trellix
Published: 2023-06-07T06:37:33.280Z
Updated: 2024-08-02T06:12:20.659Z
Reserved: 2023-04-19T15:35:06.060Z
Link: CVE-2023-2186
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-06-07T07:15:08.490
Modified: 2024-11-21T07:58:06.300
Link: CVE-2023-2186
Redhat
No data.