Vulnerability Description
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send broadcast events to any user via the WebMonitor.An unauthenticated user can use this vulnerability to forcefully log out of any currently logged-in user by sending a "password change event". Furthermore, an attacker could use this vulnerability to spam the logged-in user with false events.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trianglemicroworks | Scada Data Gateway | <= 5.01.03 |
Related Weaknesses (CWE)
References
- https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manThird Party Advisory
- https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manThird Party Advisory
FAQ
What is CVE-2023-2187?
CVE-2023-2187 is a vulnerability with a CVSS score of 5.3 (MEDIUM). On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send broadcast events to any user via the WebMonitor.An unauthenticated user can use this vulnerability ...
How severe is CVE-2023-2187?
CVE-2023-2187 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2187?
Check the references section above for vendor advisories and patch information. Affected products include: Trianglemicroworks Scada Data Gateway.