Path traversal in VTScada - CVE-2016-4532
Published: July 6, 2016 / Updated: November 22, 2018
Vulnerability identifier: #VU92
CSH Severity: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red
CVE-ID: CVE-2016-4532
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
VTScada
VTScada
Software vendor:
Trihedral Engineering Ltd
Trihedral Engineering Ltd
Description
The vulnerability allows a remote attacker to execute arbitrary code on vulnerable installations of Trihedral VTScada.
The vulnerability exists within the handling of Wireless Application Protocol requests. A remote unauthenticated attacker can cause arbitrary code execution by replacing the path in a request to retrieve any file.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
The vulnerability exists within the handling of Wireless Application Protocol requests. A remote unauthenticated attacker can cause arbitrary code execution by replacing the path in a request to retrieve any file.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Trihedral Engineering Ltd. has created an updated software version 11.2.02, available at:
ftp://ftp.trihedral.com/VTS/
ftp://ftp.trihedral.com/VTS/