Vulnerabilites related to aveva - enterprise_data_management
CVE-2023-6132 (GCVE-0-2023-6132)
Vulnerability from cvelistv5
Published
2024-02-29 17:40
Modified
2024-08-22 18:02
CWE
  • CWE-427 - Uncontrolled Search Path Element
Summary
The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
Impacted products
Vendor Product Version
AVEVA AVEVA Edge Version: 0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:21:17.249Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:aveva:aveva_edge:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "aveva_edge",
            "vendor": "aveva",
            "versions": [
              {
                "lessThan": "2020_r2_sp2",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-6132",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-29T20:50:57.047063Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-22T18:02:51.796Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "AVEVA Edge",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2020 R2 SP2",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Ting Chen of UESTC discovered and disclosed this vulnerability to AVEVA. "
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "ADLab of Venustech discovered and disclosed this vulnerability to AVEVA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.\u003c/span\u003e\n\n"
            }
          ],
          "value": "\nThe vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-29T17:40:05.162Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03"
        },
        {
          "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eAVEVA recommends users upgrade to AVEVA Edge 2023, or AVEVA Edge 2020 R2 SP2 P01 as soon as possible. Upgrades can be downloaded from the AVEVA official website: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://softwaresupportsp.aveva.com/#/producthub/details?id=0c8abaf3-2e4c-4be1-aa78-3ad445c58a16\"\u003eAVEVA Edge 2023\u003c/a\u003e, \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://softwaresupportsp.aveva.com/#/producthub/details?id=1e5d9950-d945-4bab-984b-245fe3f152ac\"\u003eAVEVA Edge 2020 R2 SP2 P01\u003c/a\u003e.\u003c/p\u003e\u003cul\u003e\u003cli\u003eNote: Log-in is required.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eFor additional information, please refer to AVEVA\u0027s security advisory \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\"\u003eAVEVA-2024-002.\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nAVEVA recommends users upgrade to AVEVA Edge 2023, or AVEVA Edge 2020 R2 SP2 P01 as soon as possible. Upgrades can be downloaded from the AVEVA official website:  AVEVA Edge 2023 https://softwaresupportsp.aveva.com/#/producthub/details ,  AVEVA Edge 2020 R2 SP2 P01 https://softwaresupportsp.aveva.com/#/producthub/details .\n\n  *  Note: Log-in is required.\n\n\nFor additional information, please refer to AVEVA\u0027s security advisory  AVEVA-2024-002. https://www.aveva.com/en/support-and-success/cyber-security-updates/ \n\n\n\n\n"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "AVEVA Edge products  Uncontrolled Search Path Element",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2023-6132",
    "datePublished": "2024-02-29T17:40:05.162Z",
    "dateReserved": "2023-11-14T16:29:50.706Z",
    "dateUpdated": "2024-08-22T18:02:51.796Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-38410 (GCVE-0-2021-38410)
Vulnerability from cvelistv5
Published
2022-07-27 20:23
Modified
2025-04-17 15:49
CWE
  • CVE-427
Summary
AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.
Impacted products
Vendor Product Version
AVEVA Platform Common Services (PCS) Portal Version: 4.5.2
Version: 4.5.1
Version: 4.5.0
Version: 4.4.6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:37:16.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-38410",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-17T14:32:14.948738Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-427",
                "description": "CWE-427 Uncontrolled Search Path Element",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-17T15:49:43.702Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Platform Common Services (PCS) Portal",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "4.5.2"
            },
            {
              "status": "affected",
              "version": "4.5.1"
            },
            {
              "status": "affected",
              "version": "4.5.0"
            },
            {
              "status": "affected",
              "version": "4.4.6"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Noam Moshe of Claroty discovered and disclosed the vulnerability to the AVEVA Software Security Response Center."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CVE-427",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-27T20:23:04.000Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "AVEVA recommends organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation. Users of affected versions of the products should apply the corresponding security update as soon as possible.\n\nSecurity update PCS 4.5.3 is available for the following versions:\n    AVEVA Mobile Operator 2020\n    AVEVA Enterprise Data Management 2021\n    AVEVA System Platform 2020 R2 P01\n    AVEVA System Platform 2020 R2\n    AVEVA Work Tasks 2020 Update 1\n\nSecurity update PCS 4.4.7 is available for the following versions:\n    AVEVA System Platform 2020\n    AVEVA Work Tasks 2020\n    AVEVA Manufacturing Execution System 2020\n    AVEVA Batch Management 2020\n\nFor more information on this issue, including security updates, please see Security Bulletin AVEVA-2021-008."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "AVEVA PCS Portal Uncontrolled Search Path Element",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2021-38410",
          "STATE": "PUBLIC",
          "TITLE": "AVEVA PCS Portal Uncontrolled Search Path Element"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Platform Common Services (PCS) Portal",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "4.5.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "4.5.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "4.5.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "4.4.6"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AVEVA"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Noam Moshe of Claroty discovered and disclosed the vulnerability to the AVEVA Software Security Response Center."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CVE-427"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01",
              "refsource": "CONFIRM",
              "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01"
            },
            {
              "name": "https://www.aveva.com/en/support-and-success/cyber-security-updates/",
              "refsource": "CONFIRM",
              "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "AVEVA recommends organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation. Users of affected versions of the products should apply the corresponding security update as soon as possible.\n\nSecurity update PCS 4.5.3 is available for the following versions:\n    AVEVA Mobile Operator 2020\n    AVEVA Enterprise Data Management 2021\n    AVEVA System Platform 2020 R2 P01\n    AVEVA System Platform 2020 R2\n    AVEVA Work Tasks 2020 Update 1\n\nSecurity update PCS 4.4.7 is available for the following versions:\n    AVEVA System Platform 2020\n    AVEVA Work Tasks 2020\n    AVEVA Manufacturing Execution System 2020\n    AVEVA Batch Management 2020\n\nFor more information on this issue, including security updates, please see Security Bulletin AVEVA-2021-008."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2021-38410",
    "datePublished": "2022-07-27T20:23:04.000Z",
    "dateReserved": "2021-08-10T00:00:00.000Z",
    "dateUpdated": "2025-04-17T15:49:43.702Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2022-07-27 21:15
Modified
2025-04-17 16:15
Summary
AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC211CF9-48DB-499F-8C47-8FA9FBC793F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:enterprise_data_management:2020:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CCF803-21E5-488F-BCAA-3379FF8C20EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*",
              "matchCriteriaId": "1288B3F5-2A5F-4516-96F8-FDB33A71060A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:mobile_operator:2020:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D03AD9-31E2-422F-9137-4E881A942C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5AA794-B71B-4DC2-8254-558DA9EAA18C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA195955-5FCD-45B6-8A92-237841971054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB04BBFF-711B-4131-9351-2D6368D51551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7D391D-D697-4517-BA2D-207CF0E59D1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*",
              "matchCriteriaId": "D47F4B07-B67F-4855-AED2-D17B0E76FA8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*",
              "matchCriteriaId": "1ED7E9C7-B882-4F57-B796-59A4F90EE185",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*",
              "matchCriteriaId": "33D5FF9C-590D-4BA3-A265-35956E4F36DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*",
              "matchCriteriaId": "78E65146-9CB1-423B-A565-48530C453382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*",
              "matchCriteriaId": "64EF2703-3C49-468A-ADA9-E78173DF4F65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path."
    },
    {
      "lang": "es",
      "value": "AVEVA Software Platform Common Services (PCS) Portal versiones 4.5.2, 4.5.1, 4.5.0 y 4.4.6, son vulnerables a un secuestro de DLL mediante un elemento de ruta de b\u00fasqueda no controlado, que puede permitir a un atacante el control de una o m\u00e1s ubicaciones en la ruta de b\u00fasqueda"
    }
  ],
  "id": "CVE-2021-38410",
  "lastModified": "2025-04-17T16:15:23.570",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 5.9,
        "source": "ics-cert@hq.dhs.gov",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-27T21:15:08.523",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-29 18:15
Modified
2025-03-04 12:38
Summary
The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5AA794-B71B-4DC2-8254-558DA9EAA18C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA195955-5FCD-45B6-8A92-237841971054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB04BBFF-711B-4131-9351-2D6368D51551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7D391D-D697-4517-BA2D-207CF0E59D1D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC211CF9-48DB-499F-8C47-8FA9FBC793F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:aveva:enterprise_data_management:2021:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E14A30-8B46-4C8F-8D3D-9B1825FCD1F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*",
              "matchCriteriaId": "1288B3F5-2A5F-4516-96F8-FDB33A71060A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:*",
              "matchCriteriaId": "B9AA5D22-126E-4E0B-AD44-8990B9218AA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*",
              "matchCriteriaId": "D47F4B07-B67F-4855-AED2-D17B0E76FA8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*",
              "matchCriteriaId": "1ED7E9C7-B882-4F57-B796-59A4F90EE185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*",
              "matchCriteriaId": "33D5FF9C-590D-4BA3-A265-35956E4F36DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*",
              "matchCriteriaId": "78E65146-9CB1-423B-A565-48530C453382",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*",
              "matchCriteriaId": "64EF2703-3C49-468A-ADA9-E78173DF4F65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nThe vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.\n\n"
    },
    {
      "lang": "es",
      "value": "La vulnerabilidad, si se explota, podr\u00eda permitir que una entidad maliciosa con acceso al sistema de archivos logre la ejecuci\u00f3n de c\u00f3digo arbitrario y una escalada de privilegios enga\u00f1ando a AVEVA Edge para que cargue una DLL insegura."
    }
  ],
  "id": "CVE-2023-6132",
  "lastModified": "2025-03-04T12:38:47.847",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 5.9,
        "source": "ics-cert@hq.dhs.gov",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-29T18:15:16.283",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Primary"
    }
  ]
}