fkie_cve-2016-4510
Vulnerability from fkie_nvd
Published
2016-06-09 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to bypass authentication and read arbitrary files via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trihedral:vtscada:10.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "CE5FB3C2-42F0-4112-835F-EF71D4E17D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "49946BC8-E01F-4F74-88B4-5F0B1A6179C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.1.07:*:*:*:*:*:*:*", "matchCriteriaId": "0E9BB54A-83AE-41F8-B40B-BC3CB37683DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "DEA21497-E048-4510-AA31-887235217F80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trihedral:vtscada:10.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "697CBAB8-7025-44A6-A5A6-AFDDFA506CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "8AC6FD46-0B0B-4859-A25C-292257454B66", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C42E3FF1-2FF0-433A-B450-185079707242", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "591B8DE2-8150-4E4B-B293-D58598112E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "F9D4C8A2-1B3B-4A2C-BADC-B3745F4001F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "5ED3D431-13B0-4A2C-BE9F-64B89877DEEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "E6C1112A-8D28-4E58-B6E6-A8E95C09B06C", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.09:*:*:*:*:*:*:*", "matchCriteriaId": "9155F402-CED2-47BE-A77E-04B8CA33C820", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B0BC5077-7CE2-4670-8DCE-89168EB9EB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "3121360F-A114-46C9-A2D2-183B9481E9D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3C0EAFD7-0D67-4865-8537-E81B193A11B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "0921489A-10AA-46D1-AD45-F29F0D97E302", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "1C4BB39D-3EC5-4F81-9AB8-C003FB40ECE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "E3F18ED0-7095-4126-B839-688994778D45", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5775D09F-02F8-45FE-94E4-B5BAB6A5FFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "6EA6AD0D-B2EA-4112-B437-F87C4265B9CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "6C41FA48-FDAF-48FC-9E98-F95C2E9AC835", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "EA71226A-7AFA-4185-A8A5-174C44C173C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1203617F-45D8-47C3-B32D-0F0DED539D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "FDF04525-41E4-4DEE-BBF0-268F8B6969DB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trihedral:vtscada:8.0.05:*:*:*:*:*:*:*", "matchCriteriaId": "35A5A441-F299-4E51-B2BF-872F263AC96C", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:8.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "D881DA9B-332A-47B0-9E1D-3936CC0E1761", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:8.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "8DB1488E-ABD2-443A-B51C-328FF32D4E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:8.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "EFB14116-AA51-408D-B632-5605CCD18D7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:8.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "5B1122D8-6E21-40A8-916A-E66622146CC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:8.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "AB0611D9-9C16-480A-BDB8-CC4FA289E6FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.05:*:*:*:*:*:*:*", "matchCriteriaId": "40460E2C-6919-4BF1-9E24-B3EE408FA995", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.07:*:*:*:*:*:*:*", "matchCriteriaId": "3C031266-31AF-436C-9F36-D7112D1EE9BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "862D6C1B-0765-43C9-BD39-7C9F90025C50", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "95A94950-0F03-42FD-A74D-8ADE7A59DDD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "0B1798A8-EC8D-4CC5-AEBA-16EC45D1E754", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "57B7C44C-9920-439A-BDDD-EC3C3DC171A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "0F4BFACD-CEDB-4F1C-8BA6-E8B0BEF735F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "10349B72-13D3-4B70-B8CB-1223381F3630", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "721D6C57-2ADA-4400-A876-80281819CE1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "4266371D-4476-4455-8CAF-83DAD092783C", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "92EBB482-30B1-4AB3-A26A-0F1B66DFE5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:10.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "1AC79329-249A-41C6-A545-B681DD494606", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trihedral:vtscada:9.0.02:*:*:*:*:*:*:*", "matchCriteriaId": "F47D9BD4-A05E-4696-A6D9-7AEFE20BBD14", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:9.0.03:*:*:*:*:*:*:*", "matchCriteriaId": "A1A85151-B206-4307-88C3-9107366C867F", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:9.0.08:*:*:*:*:*:*:*", "matchCriteriaId": "3A1D1396-B8FA-4092-B136-899E2167B446", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:9.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "C1277933-197D-45D8-940C-1951212F9D95", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:9.1.03:*:*:*:*:*:*:*", "matchCriteriaId": "6D5D9BD5-6C99-45E0-9CE0-B25C2C5353F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:9.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "42DB3997-3DCF-403F-B054-3F8AF25BC089", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:9.1.09:*:*:*:*:*:*:*", "matchCriteriaId": "B5535DFC-4C77-4339-9C7A-C38BEC4404BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:9.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "6DC20DC9-6606-460E-97AE-02D1F579E37C", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:9.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "DBC2BF11-CE15-4216-928B-BF63B587FE8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:9.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "1BCCFB2C-00B7-4828-BCE3-97EBC4057669", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trihedral:vtscada:11.0.05:*:*:*:*:*:*:*", "matchCriteriaId": "B5EB9BB9-F8C9-4661-AC5A-E3FD79AD4EEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:trihedral:vtscada:11.0.07:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6832C-B4EA-4A72-8ADF-B17F76DEE676", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to bypass authentication and read arbitrary files via unspecified vectors." }, { "lang": "es", "value": "La interfaz WAP en Trihedral VTScada (anteriormente VTS) 8.x hasta la versi\u00f3n 11.x en versiones anteriores a 11.2.02 permite a atacantes remotos eludir autenticaci\u00f3n y leer archivos arbitrarios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2016-4510", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-09T10:59:03.043", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "http://www.securityfocus.com/bid/91077" }, { "source": "ics-cert@hq.dhs.gov", "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-404" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…