SpiderControl SCADA Web Server Vulnerability Allows Unauthenticated File Upload
CVE-2024-8232

7.5HIGH

Key Information:

Vendor
CVE Published:
10 September 2024

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2024-8232?

The SpiderControl SCADA Web Server contains a vulnerability that allows attackers to upload specially crafted malicious files without any authentication. This security lapse can be exploited to compromise the integrity and availability of the SCADA system, potentially leading to unauthorized access and manipulation of sensitive operational data. To mitigate this risk, users should apply the latest patches and monitor their systems closely for unusual activity.

Affected Version(s)

SpiderControl SCADA Web Server 0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

Credit

elcazators ELEX FEIGONG RESEARCH INSTITUTE of Elex CyberSecurity, Inc reported this vulnerability to CERT/CC.
.
CVE-2024-8232 : SpiderControl SCADA Web Server Vulnerability Allows Unauthenticated File Upload