Triangle MicroWorks SCADA Data Gateway < 3.3.729 Heartbeat Information Disclosure (Heartbleed)

High Nessus Plugin ID 76575


The remote server is affected by the Heartbleed vulnerability.


The remote host has a version of SCADA Data Gateway installed that is prior to 3.3.729. It is, therefore, affected by an out-of-bounds read error, known as the 'Heartbleed Bug' in the included OpenSSL version.

This error is related to handling TLS heartbeat extensions that could allow an attacker to obtain sensitive information such as primary key material, secondary key material, and other protected content. Note this affects both client and server modes of operation.

Note that Nessus has not tested for this issue, but has instead relied only on the application's version number.


Upgrade to SCADA Data Gateway 3.3.729 or later.

See Also

Plugin Details

Severity: High

ID: 76575

File Name: scada_triangle_gateway_3_3_729.nbin

Version: $Revision: 1.25 $

Type: local

Family: SCADA

Published: 2014/07/07

Modified: 2018/01/29

Dependencies: 76573

Risk Information

Risk Factor: High


Base Score: 9.7

Temporal Score: 8.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:trianglemicroworks:scada_data_gateway

Required KB Items: installed_sw/Triangle MicroWorks SCADA Data Gateway

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/05/30

Vulnerability Publication Date: 2014/05/30

Exploitable With

Core Impact

Metasploit (OpenSSL Heartbeat (Heartbleed) Information Leak)

Reference Information

CVE: CVE-2014-0160

BID: 66690

OSVDB: 105465

CERT: 720951

EDB-ID: 32745, 32764, 32791, 32998