Vulnerability Description
Directory traversal vulnerability in the WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to read arbitrary files via a crafted pathname.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trihedral | Vtscada | 10.1.05 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/91077
- http://www.zerodayinitiative.com/advisories/ZDI-16-403
- https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/91077
- http://www.zerodayinitiative.com/advisories/ZDI-16-403
- https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2016-4532?
CVE-2016-4532 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Directory traversal vulnerability in the WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to read arbitrary files via a crafted pathname.
How severe is CVE-2016-4532?
CVE-2016-4532 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-4532?
Check the references section above for vendor advisories and patch information. Affected products include: Trihedral Vtscada.