Trihedral VTScada 8.x < 11.2.02 Multiple Vulnerabilities

Medium Nessus Plugin ID 103533

Synopsis

A SCADA application is affected by multiple vulnerabilities.

Description

According to its self-reported version, the Trihedral VTScada running on the remote host is after 8 and prior to 11.2.02. It is, therefore, affected by multiple vulnerabilities :

- An authentication issue exists within the handling of Wireless Application Protocol requests due to the failure to properly validate user-supplied filenames. An unauthenticated, remote attacker can leverage this vulnerability to disclose the contents of arbitrary files under the context of the user running the service. (CVE-2016-4510)

- An Out-Of-Bounds read within the handling of Wireless Application Protocol requests due to the failure to traverse user-supplied paths. An unauthenticated, remote attacker can leverage this vulnerability to execute code under the context of the user running the service. (CVE-2016-4523)

- A path traversal information disclosure vulnerability within the handling of Wireless Application Protocol requests due to the failure to properly restrict the path from which images are retrieved. An remote, unauthenticated, attacker can leverage this vulnerability to disclose the contents of arbitrary files under the context of the user running the service. (CVE-2016-4532)

Solution

Upgrade to Trihedral VTScada 11.2.02 or later.

See Also

https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01

Plugin Details

Severity: Medium

ID: 103533

File Name: scada_trihedral_vtscada_11_2_02.nbin

Version: 1.13

Type: remote

Family: SCADA

Published: 2017/09/28

Modified: 2018/11/06

Dependencies: 103534

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS v3.0

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

CPE: cpe:/a:trihedral:vtscada

Required KB Items: trihedral/vtscada/version

Patch Publication Date: 2016/06/07

Vulnerability Publication Date: 2016/06/07

Reference Information

CVE: CVE-2016-4510, CVE-2016-4523, CVE-2016-4532

BID: 91077

ICSA: 16-159-01

ZDI: ZDI-16-403, ZDI-16-404, ZDI-16-405