Trihedral.VTScada.WAP.Filter.Bypass

description-logoDescription

This indicates an attack attempt against an Authentication Bypass vulnerability in the web interface of Trihedral VTScada.
The vulnerability is due to insufficient input validation in the application when handling a crafted request. A remote attacker may be able to to access confidential information via a crafted request, under the context of the user running the service.

affected-products-logoAffected Products

Trihedral VTScada v8.0 through 11.2.01

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Apply the latest update from the vendor.
http://www.trihedral.com/help/Content/Op_Welcome/Wel_UpgradeNotes.htm

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-06-10 14.629 Severity:low:critical