CVE-2023-39463

Triangle MicroWorks SCADA Data Gateway Trusted Certification Unrestricted Upload of File Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the trusted certification feature. The issue lies in the handling of the OpcUaSecurityCertificateAuthorityTrustDir variable, which allows an arbitrary file write with attacker-controlled data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20537.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*

History

17 Jun 2025, 21:03

Type Values Removed Values Added
CPE cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*
First Time Trianglemicroworks scada Data Gateway
Trianglemicroworks
References () https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new - () https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new - Release Notes
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1031/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1031/ - Third Party Advisory

Information

Published : 2024-05-03 03:15

Updated : 2025-06-17 21:03


NVD link : CVE-2023-39463

Mitre link : CVE-2023-39463

CVE.ORG link : CVE-2023-39463


JSON object : View

Products Affected

trianglemicroworks

  • scada_data_gateway
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type