First published: Sat Dec 16 2023(Updated: )
An issue was discovered in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior. The application allows a client to provide a malicious connection string that could allow an adversary to port scan the LAN, depending on the hosts' responses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AVEVA Edge | ||
AVEVA Edge 2020 R2 SP1 | ||
AVEVA InduSoft Web Studio | ||
AVEVA Edge 2020 R2 SP1 | <2020 | |
AVEVA Edge 2020 R2 SP1 | =2020 | |
AVEVA Edge 2020 R2 SP1 | =2020-r2 | |
AVEVA Edge 2020 R2 SP1 | =2020-r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42794 has been identified as a significant vulnerability that allows potential port scanning of the LAN.
To mitigate CVE-2021-42794, users should upgrade to a patched version of AVEVA Edge beyond version R2020.
CVE-2021-42794 facilitates connection string parameter pollution attacks that could allow an adversary to conduct port scans.
CVE-2021-42794 affects AVEVA Edge versions R2020 and all prior versions.
Currently, the most effective mitigation for CVE-2021-42794 is to upgrade the software to a version that addresses the vulnerability.