Trihedral Engineering Limited VTScada Vulnerabilities
Trihedral Engineering VTScada versions 8.0 through 11.2.01 contain multiple critical vulnerabilities including path traversal (CWE-22) and buffer over-read (CWE-125) flaws that allow unauthenticated remote attackers to read arbitrary files and modify configuration data. The vulnerabilities result from insufficient input validation and improper access controls. Affected SCADA servers exposed to network access can be exploited without valid credentials or user interaction. The vendor has not released a patched version at the time of advisory publication.
- Network access to VTScada server port (typically 2552 or web service ports)
- VTScada version 8.0 through 11.2.01
- No authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/34336fb7-30e6-48af-a368-87ecab041092Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.