Advisory Details

April 16th, 2020

(Pwn2Own) Triangle MicroWorks SCADA Data Gateway DNP3 Type Confusion Remote Code Execution Vulnerability

ZDI-20-549
ZDI-CAN-10301

CVE ID CVE-2020-10611
CVSS SCORE 9.8, (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
AFFECTED VENDORS Triangle MicroWorks
AFFECTED PRODUCTS SCADA Data Gateway
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of data set elements. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

ADDITIONAL DETAILS Triangle MicroWorks has issued an update to correct this vulnerability. More details can be found at:
https://www.us-cert.gov/ics/advisories/icsa-20-105-03
DISCLOSURE TIMELINE
  • 2020-01-30 - Vulnerability reported to vendor
  • 2020-04-16 - Coordinated public release of advisory
CREDIT Tobias Scharnowski, Niklas Breitfeld, and Ali Abbasi
BACK TO ADVISORIES