CVE-2016-4523
high-risk
Published 2016-06-09
The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via unspecified vectors.
Do I need to act?
!
67.0% chance of exploitation in next 30 days
EPSS score — higher than 33% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Vtscada
Affected Vendors
References (7)
Broken Link
http://www.securityfocus.com/bid/91077
Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-16-405
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01
Broken Link
http://www.securityfocus.com/bid/91077
Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-16-405
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01
57
/ 100
high-risk
Severity
26/34 · High
Exploitability
26/34 · High
Exposure
5/34 · Minimal