On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.
History

Mon, 06 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2025-01-06T20:10:28.548Z

Reserved: 2023-04-19T15:35:06.060Z

Link: CVE-2023-2186

cve-icon Vulnrichment

Updated: 2024-08-02T06:12:20.659Z

cve-icon NVD

Status : Modified

Published: 2023-06-07T07:15:08.490

Modified: 2024-11-21T07:58:06.300

Link: CVE-2023-2186

cve-icon Redhat

No data.