{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0956","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2023-02-22T16:00:49.434Z","datePublished":"2023-08-03T18:08:13.924Z","dateUpdated":"2025-01-16T21:31:03.063Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"TelWin SCADA WebInterface","vendor":"TEL-STER","versions":[{"lessThanOrEqual":"6.1","status":"affected","version":"3.2","versionType":"custom"},{"lessThanOrEqual":"7.1","status":"affected","version":"7.0","versionType":"custom"},{"lessThanOrEqual":"9.0","status":"affected","version":"8.0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Marcin Dudek of CERT.PL reported this vulnerability to TEL-STER."}],"datePublic":"2023-08-03T18:04:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">External input could be used on TEL-STER TelWin SCADA WebInterface to construct paths to files and directories without properly neutralizing special elements within the pathname, which could allow an unauthenticated attacker to read files on the system.</span>\n\n"}],"value":"\nExternal input could be used on TEL-STER TelWin SCADA WebInterface to construct paths to files and directories without properly neutralizing special elements within the pathname, which could allow an unauthenticated attacker to read files on the system.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"cwe-35 Path Traversal","lang":"en"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2023-08-03T18:08:13.924Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-03"},{"url":"https://www.tel-ster.pl/index.php/telwin-scada/nowosci/372-telwin-scada-podatnosc-cve-2023-0956"},{"url":"https://cert.pl/posts/2023/07/CVE-2023-0956/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>TEL-STER recommends that users <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.tel-ster.pl/index.php/en/telwin-scada-eng/news-telwin-eng\">update WebInterface module</a>&nbsp;to one of the following versions: 6.2, 7.2, 8.1, 9.1, or 10.0. Please note that the WebInterface is part of the TelWin SCADA software and is usually updated with the software. TEL-STER only currently supports and updates TelWin SCADA 7.8 (WebInteraface 6.x) upwards TEL-STER does not have any updates planned for versions using older vulnerable WebInterface (lower than 6.0), and users are recommended to update TelWin SCADA to one of the supported versions. For more information, please contact TEL-STER.</p><p>More information about this issue and the associated mitigation can be found at <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.tel-ster.pl/index.php/telwin-scada/nowosci/372-telwin-scada-podatnosc-cve-2023-0956\">TEL-STER advisory</a>&nbsp;or <a target=\"_blank\" rel=\"nofollow\" href=\"https://cert.pl/posts/2023/07/CVE-2023-0956/\">CERT.PL advisory</a>.</p>\n\n<br>"}],"value":"\nTEL-STER recommends that users  update WebInterface module https://www.tel-ster.pl/index.php/en/telwin-scada-eng/news-telwin-eng  to one of the following versions: 6.2, 7.2, 8.1, 9.1, or 10.0. Please note that the WebInterface is part of the TelWin SCADA software and is usually updated with the software. TEL-STER only currently supports and updates TelWin SCADA 7.8 (WebInteraface 6.x) upwards TEL-STER does not have any updates planned for versions using older vulnerable WebInterface (lower than 6.0), and users are recommended to update TelWin SCADA to one of the supported versions. For more information, please contact TEL-STER.\n\nMore information about this issue and the associated mitigation can be found at  TEL-STER advisory https://www.tel-ster.pl/index.php/telwin-scada/nowosci/372-telwin-scada-podatnosc-cve-2023-0956  or  CERT.PL advisory https://cert.pl/posts/2023/07/CVE-2023-0956/ .\n\n\n\n\n"}],"source":{"discovery":"EXTERNAL"},"title":"TEL-STER TelWin SCADA WebInterface Path Traversal","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:32:46.264Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-03","tags":["x_transferred"]},{"url":"https://www.tel-ster.pl/index.php/telwin-scada/nowosci/372-telwin-scada-podatnosc-cve-2023-0956","tags":["x_transferred"]},{"url":"https://cert.pl/posts/2023/07/CVE-2023-0956/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-16T21:20:48.250297Z","id":"CVE-2023-0956","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-16T21:31:03.063Z"}}]}}