First published: Thu Sep 24 2020(Updated: )
SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. Parameter ClassName in CHaD.asmx is vulnerable to unauthenticated SQL injection attacks.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aveva Edna Enterprise Data Historian | =3.0.1.2\/7.5.4989.33053 | |
AVEVA Enterprise Data Management Web v2019 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13500 is critical.
The affected software for CVE-2020-13500 is Aveva Edna Enterprise Data Historian version 3.0.1.2/7.5.4989.33053.
CVE-2020-13500 allows for SQL injections, which can result in data compromise.
To fix CVE-2020-13500, it is recommended to apply the latest security patches provided by Aveva.
Yes, you can find references for CVE-2020-13500 at the following URLs: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 and https://us-cert.cisa.gov/ics/advisories/icsa-20-254-01.