CVE-2023-39467
📋 TL;DR
This vulnerability allows remote attackers to access sensitive certificate information without authentication in Triangle MicroWorks SCADA Data Gateway. The flaw exposes certificate files in the web directory, potentially revealing cryptographic materials. Organizations using this SCADA/ICS gateway software are affected.
💻 Affected Systems
- Triangle MicroWorks SCADA Data Gateway
📦 What is this software?
Scada Data Gateway by Trianglemicroworks
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain private certificates enabling man-in-the-middle attacks, credential theft, or further system compromise in industrial control environments.
Likely Case
Sensitive certificate information disclosure allowing attackers to map system architecture and plan targeted attacks.
If Mitigated
Limited information exposure with no direct system compromise if certificates are properly segregated and monitored.
🎯 Exploit Status
Simple directory traversal or direct web access to certificate files.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.1.0.107
Vendor Advisory: https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new
Restart Required: Yes
Instructions:
1. Download version 5.1.0.107 or later from Triangle MicroWorks. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the SCADA Data Gateway service.
🔧 Temporary Workarounds
Restrict web directory access
windowsConfigure web server to block access to certificate directories
# Configure IIS/web server to deny access to certificate directories
# Use appropriate access control lists for the webroot
Network segmentation
allIsolate SCADA Data Gateway from untrusted networks
# Configure firewall rules to restrict access to gateway
# Implement network segmentation per ICS security best practices
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the SCADA Data Gateway web interface
- Monitor and alert on access attempts to certificate directories in web logs
🔍 How to Verify
Check if Vulnerable:
Check if certificate files are accessible via web browser at paths like /certificates/ or similar web-accessible directories
Check Version:
Check version in SCADA Data Gateway administration interface or About dialog
Verify Fix Applied:
Verify version is 5.1.0.107 or later and test that certificate directories are no longer web-accessible
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to certificate file paths
- Unauthenticated access to sensitive directories
Network Indicators:
- Unusual HTTP GET requests for .cer, .pem, .pfx files
- Traffic to certificate directories from unauthorized sources
SIEM Query:
source="web_logs" AND (url="*cert*" OR url="*.cer" OR url="*.pem" OR url="*.pfx") AND status=200