Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-10611

EPSS 9.01% · P93
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-10611

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 allows remote attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type confusion condition. Authentication is not required to exploit this vulnerability. Only applicable to installations using DNP3 Data Sets.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用不兼容类型访问资源(类型混淆)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Triangle MicroWorks SCADA Data Gateway 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Triangle MicroWorks SCADA Data Gateway是美国Triangle MicroWorks公司的一款SCADA数据网关产品。 Triangle MicroWorks SCADA Data Gateway 3.02.0697版本至4.0.122版本和2.41.0213版本至4.0.122版本中存在安全漏洞,该漏洞源于程序没有正确验证用户提供的数据。远程攻击者可借助特制请求利用该漏洞在系统上执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 -

II. Public POCs for CVE-2020-10611

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-10611

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-04-15 · 121 CVEs total

CVE-2020-6996Triangle MicroWorks DNP3 Outstation Libraries 缓冲区错误漏洞
CVE-2019-20666NETGEAR RBR50、RBS50和RBK50 跨站脚本漏洞
CVE-2020-11666Broadcom CA API Developer Portal 安全漏洞
CVE-2019-20665多款NETGEAR产品跨站脚本漏洞
CVE-2020-11665Broadcom CA API Developer Porta 输入验证错误漏洞
CVE-2020-11664Broadcom CA API Developer Portal 输入验证错误漏洞
CVE-2019-20664多款NETGEAR产品跨站脚本漏洞
CVE-2019-20663多款NETGEAR产品跨站脚本漏洞
CVE-2019-12522Squid 安全漏洞
CVE-2019-20662多款NETGEAR产品跨站脚本漏洞
CVE-2019-20661多款NETGEAR产品跨站脚本漏洞
CVE-2019-20660多款NETGEAR产品跨站脚本漏洞
CVE-2019-20659多款NETGEAR产品命令注入漏洞
CVE-2019-12521Squid 缓冲区错误漏洞
CVE-2019-20658多款NETGEAR产品信息泄露漏洞
CVE-2020-11799Z-Cron 安全漏洞
CVE-2019-12524Squid 访问控制错误漏洞
CVE-2020-10613Triangle MicroWorks SCADA Data Gateway 缓冲区错误漏洞
CVE-2020-10615Triangle MicroWorks SCADA Data Gateway 缓冲区错误漏洞
CVE-2019-20649NETGEAR MR1100 信息泄露漏洞

Showing top 20 of 121 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-10611

No comments yet


Leave a comment