First published: Thu Apr 11 2019(Updated: )
AVEVA Wonderware System Platform 2017 Update 2 and prior uses an ArchestrA network user account for authentication of system processes and inter-node communications. A user with low privileges could make use of an API to obtain the credentials for this account.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
AVEVA Wonderware System Platform | <2017 | |
AVEVA Wonderware System Platform | =2017 | |
AVEVA Wonderware System Platform | =2017-update_1 | |
AVEVA Wonderware System Platform | =2017-update_2 | |
<2017 | ||
=2017 | ||
=2017-update_1 | ||
=2017-update_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6525 is a vulnerability in AVEVA Wonderware System Platform 2017 Update 2 and prior that allows a user with low privileges to obtain the credentials for an ArchestrA network user account.
CVE-2019-6525 can be exploited by a user with low privileges to obtain the credentials for the ArchestrA network user account used for authentication of system processes and inter-node communications in AVEVA Wonderware System Platform.
CVE-2019-6525 has a severity score of 8.8 out of 10, indicating a high severity.
CVE-2019-6525 affects AVEVA Wonderware System Platform 2017, 2017-update_1, and 2017-update_2.
To fix CVE-2019-6525, it is recommended to upgrade to a version of AVEVA Wonderware System Platform that is not affected by the vulnerability.