Triangle MicroWorks Improper Input Validation
Triangle MicroWorks SCADA Data Gateway and DNP3 protocol components contain improper input validation vulnerabilities (CWE-20, CWE-119) that fail to properly check the bounds and type of user-supplied input. An attacker could exploit this via a buffer overflow (CWE-119) to cause memory corruption or denial of service. The vulnerability affects SCADA Data Gateway versions 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components versions 3.06.0.171 through 3.15.0.369, and DNP3 ANSI C source code libraries versions 3.06.0000 through 3.15.0000. No patch is available from the vendor.
- Network access to SCADA Data Gateway port or DNP3 protocol endpoint
- No authentication required to send input to affected component
Patching may require device reboot — plan for process interruption
/api/v1/advisories/21f7c5f2-a73c-43eb-9702-2fc249dcb55bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.