CVE-2022-3181
Trihedral VTScada vulnerability analysis and mitigation

Overview

CVE-2022-3181 is an Improper Input Validation vulnerability affecting Trihedral VTScada versions 12.0.38 and prior when configured to accept incoming HTTP(S) connections. The vulnerability was discovered and reported by Trihedral to CISA, with a CVSS v3 base score of 7.5, indicating a high severity level (CISA Advisory).

Technical details

The vulnerability stems from improper input validation (CWE-20) where a specifically malformed HTTP request can trigger a crash in the affected VTScada system. The vulnerability affects both local area network (LAN)-only and internet-facing systems. The CVSS vector string is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating that the vulnerability is network accessible with low attack complexity and requires no privileges or user interaction (CISA Advisory).

Impact

Successful exploitation of this vulnerability could cause a denial-of-service condition in the affected product, potentially disrupting operations in critical infrastructure sectors including Energy, Water and Wastewater systems (CISA Advisory).

Mitigation and workarounds

Trihedral has released version 12.0.39 which fixes this vulnerability. For systems that must accept incoming HTTP connections, users should limit accepted connections exclusively to trusted LAN networks accessed by trusted personnel. Systems not configured to accept incoming HTTP connections are not affected. CISA recommends minimizing network exposure for all control system devices, locating control systems behind firewalls, isolating them from business networks, and using secure methods like VPNs for remote access (CISA Advisory).

Additional resources


SourceThis report was generated using AI

Related Trihedral VTScada vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2017-14031HIGH7.8
  • Trihedral VTScadaTrihedral VTScada
  • cpe:2.3:a:trihedral:vtscada
NoYesNov 06, 2017
CVE-2017-14029HIGH7.8
  • Trihedral VTScadaTrihedral VTScada
  • cpe:2.3:a:trihedral:vtscada
NoYesNov 06, 2017
CVE-2022-3181HIGH7.5
  • Trihedral VTScadaTrihedral VTScada
  • cpe:2.3:a:trihedral:vtscada
NoYesNov 02, 2022
CVE-2017-6045HIGH7.5
  • Trihedral VTScadaTrihedral VTScada
  • cpe:2.3:a:trihedral:vtscada
NoYesJun 21, 2017
CVE-2017-6053MEDIUM6.1
  • Trihedral VTScadaTrihedral VTScada
  • cpe:2.3:a:trihedral:vtscada
NoYesJun 21, 2017

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management