CVE-2016-4532 (GCVE-0-2016-4532)
Vulnerability from cvelistv5
Published
2016-06-09 10:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in the WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to read arbitrary files via a crafted pathname.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-403" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01" }, { "name": "91077", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to read arbitrary files via a crafted pathname." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T22:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-403" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01" }, { "name": "91077", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-4532", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to read arbitrary files via a crafted pathname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-16-403", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-403" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01" }, { "name": "91077", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91077" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-4532", "datePublished": "2016-06-09T10:00:00", "dateReserved": "2016-05-05T00:00:00", "dateUpdated": "2024-08-06T00:32:25.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-4532\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2016-06-09T10:59:05.340\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in the WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to read arbitrary files via a crafted pathname.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de salto de directorio en la interfaz WAP en Trihedral VTScada (anteriormente VTS) 8.x hasta la versi\u00f3n 11.x en versiones anteriores a 11.2.02 permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de nombres de ruta manipuladas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.1.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE5FB3C2-42F0-4112-835F-EF71D4E17D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.1.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49946BC8-E01F-4F74-88B4-5F0B1A6179C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.1.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E9BB54A-83AE-41F8-B40B-BC3CB37683DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA21497-E048-4510-AA31-887235217F80\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.0.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F47D9BD4-A05E-4696-A6D9-7AEFE20BBD14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.0.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A85151-B206-4307-88C3-9107366C867F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.0.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A1D1396-B8FA-4092-B136-899E2167B446\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1277933-197D-45D8-940C-1951212F9D95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.1.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5D9BD5-6C99-45E0-9CE0-B25C2C5353F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.1.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DB3997-3DCF-403F-B054-3F8AF25BC089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.1.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5535DFC-4C77-4339-9C7A-C38BEC4404BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DC20DC9-6606-460E-97AE-02D1F579E37C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC2BF11-CE15-4216-928B-BF63B587FE8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:9.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BCCFB2C-00B7-4828-BCE3-97EBC4057669\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.0.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5EB9BB9-F8C9-4661-AC5A-E3FD79AD4EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.0.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5E6832C-B4EA-4A72-8ADF-B17F76DEE676\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40460E2C-6919-4BF1-9E24-B3EE408FA995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C031266-31AF-436C-9F36-D7112D1EE9BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"862D6C1B-0765-43C9-BD39-7C9F90025C50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95A94950-0F03-42FD-A74D-8ADE7A59DDD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1798A8-EC8D-4CC5-AEBA-16EC45D1E754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B7C44C-9920-439A-BDDD-EC3C3DC171A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4BFACD-CEDB-4F1C-8BA6-E8B0BEF735F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10349B72-13D3-4B70-B8CB-1223381F3630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"721D6C57-2ADA-4400-A876-80281819CE1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4266371D-4476-4455-8CAF-83DAD092783C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92EBB482-30B1-4AB3-A26A-0F1B66DFE5F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AC79329-249A-41C6-A545-B681DD494606\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:8.0.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A5A441-F299-4E51-B2BF-872F263AC96C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:8.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D881DA9B-332A-47B0-9E1D-3936CC0E1761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:8.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB1488E-ABD2-443A-B51C-328FF32D4E52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:8.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB14116-AA51-408D-B632-5605CCD18D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:8.1.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B1122D8-6E21-40A8-916A-E66622146CC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:8.1.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB0611D9-9C16-480A-BDB8-CC4FA289E6FF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED3D431-13B0-4A2C-BE9F-64B89877DEEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C1112A-8D28-4E58-B6E6-A8E95C09B06C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9155F402-CED2-47BE-A77E-04B8CA33C820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0BC5077-7CE2-4670-8DCE-89168EB9EB45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3121360F-A114-46C9-A2D2-183B9481E9D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C0EAFD7-0D67-4865-8537-E81B193A11B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0921489A-10AA-46D1-AD45-F29F0D97E302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4BB39D-3EC5-4F81-9AB8-C003FB40ECE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F18ED0-7095-4126-B839-688994778D45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5775D09F-02F8-45FE-94E4-B5BAB6A5FFFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EA6AD0D-B2EA-4112-B437-F87C4265B9CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C41FA48-FDAF-48FC-9E98-F95C2E9AC835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA71226A-7AFA-4185-A8A5-174C44C173C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1203617F-45D8-47C3-B32D-0F0DED539D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:11.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDF04525-41E4-4DEE-BBF0-268F8B6969DB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697CBAB8-7025-44A6-A5A6-AFDDFA506CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC6FD46-0B0B-4859-A25C-292257454B66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C42E3FF1-2FF0-433A-B450-185079707242\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"591B8DE2-8150-4E4B-B293-D58598112E3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trihedral:vtscada:10.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D4C8A2-1B3B-4A2C-BADC-B3745F4001F7\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/91077\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-16-403\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/91077\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-16-403\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…