HTTP: Trihedral VTScada WAP Filter Bypass

A filter bypass vulnerability has been reported in the web interface of Trihedral VTScada. Successful exploitation allows the attacker to read arbitrary files.

Extended Description

The WAP interface in Trihedral VTScada (formerly VTS) 8.x through 11.x before 11.2.02 allows remote attackers to bypass authentication and read arbitrary files via unspecified vectors.

Affected Products

Trihedral vtscada

Short Name
HTTP:TRIHED-VTSCADA-WAP
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Bypass CVE-2016-4510 Filter Trihedral VTScada WAP
Release Date
08/26/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Trihedral

CVSS Score

6.4

Found a potential security threat?