First published: Thu May 26 2022(Updated: )
Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Matrikon OPC Server | ||
Matrikon, a subsidiary of Honeywell Matrikon OPC Server |
Matrikon advises affected users to apply mitigations from its security best practices document (login required).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Matrikon OPC Server is CVE-2022-1261.
The severity of CVE-2022-1261 is critical (8.8).
All versions of Matrikon OPC Server are affected.
A low privileged user can exploit CVE-2022-1261 by connecting to the OPC server and using the functions of the IPersisFile to execute operating system processes with system-level privileges.
The vendor has not provided a fix for CVE-2022-1261 yet. It is recommended to apply mitigations or follow the guidance provided by the vendor or cybersecurity authorities.