Authentication bypass in VTScada - CVE-2016-4510
Published: July 6, 2016 / Updated: July 12, 2020
Vulnerability identifier: #VU95
CSH Severity: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red
CVE-ID: CVE-2016-4510
CWE-ID: CWE-255
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
VTScada
VTScada
Software vendor:
Trihedral Engineering Ltd
Trihedral Engineering Ltd
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due improper validation of user-supplied filenames. A remote unauthenticated attacker can download or view arbitrary files.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
The vulnerability exists due improper validation of user-supplied filenames. A remote unauthenticated attacker can download or view arbitrary files.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Trihedral Engineering Ltd. has created an updated software version 11.2.02, available at:
ftp://ftp.trihedral.com/VTS/
ftp://ftp.trihedral.com/VTS/