Triangle MicroWorks SCADA Data Gateway < 3.3.729 Heartbeat Information Disclosure (Heartbleed)

High Nessus Plugin ID 76575

Synopsis

The remote server is affected by the Heartbleed vulnerability.

Description

The remote host has a version of SCADA Data Gateway installed that is prior to 3.3.729. It is, therefore, affected by an out-of-bounds read error, known as the 'Heartbleed Bug' in the included OpenSSL version.

This error is related to handling TLS heartbeat extensions that could allow an attacker to obtain sensitive information such as primary key material, secondary key material, and other protected content. Note this affects both client and server modes of operation.

Note that Nessus has not tested for this issue, but has instead relied only on the application's version number.

Solution

Upgrade to SCADA Data Gateway 3.3.729 or later.

See Also

http://www.nessus.org/u?980bdd7b

http://www.heartbleed.com

https://eprint.iacr.org/2014/140

https://www.openssl.org/news/vulnerabilities.html#2014-0160

https://www.openssl.org/news/secadv/20140407.txt

Plugin Details

Severity: High

ID: 76575

File Name: scada_triangle_gateway_3_3_729.nbin

Version: 1.47

Type: local

Family: SCADA

Published: 2014/07/07

Updated: 2019/08/20

Dependencies: 76573

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.7

Temporal Score: 8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:trianglemicroworks:scada_data_gateway

Required KB Items: installed_sw/Triangle MicroWorks SCADA Data Gateway

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/05/30

Vulnerability Publication Date: 2014/05/30

Exploitable With

Core Impact

Metasploit (OpenSSL Heartbeat (Heartbleed) Information Leak)

Reference Information

CVE: CVE-2014-0160

BID: 66690

CERT: 720951

EDB-ID: 32745, 32764, 32791, 32998