Path traversal in VTScada - CVE-2016-4532

 

Path traversal in VTScada - CVE-2016-4532

Published: July 6, 2016 / Updated: November 22, 2018


Vulnerability identifier: #VU92
CSH Severity: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red
CVE-ID: CVE-2016-4532
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
VTScada
Software vendor:
Trihedral Engineering Ltd

Description

The vulnerability allows a remote attacker to execute arbitrary code on vulnerable installations of Trihedral VTScada.

The vulnerability exists within the handling of Wireless Application Protocol requests. A remote unauthenticated attacker can cause arbitrary code execution by replacing the path in a request to retrieve any file.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Trihedral Engineering Ltd. has created an updated software version 11.2.02, available at:

ftp://ftp.trihedral.com/VTS/

External links