First published: Fri Dec 23 2022(Updated: )
AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
AVEVA InTouch Access Anywhere | <2020 | |
AVEVA InTouch Access Anywhere | =2020 | |
AVEVA InTouch Access Anywhere | =2020-r2 |
AVEVA recommends users apply the following hotfixes: * InTouch Access Anywhere Secure Gateway 2020 R2 (version 20.1.0) Hotfix. * InTouch Access Anywhere Secure Gateway 2020b (version 20.0.1) Hotfix.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23854 is a vulnerability in AVEVA InTouch Access Anywhere versions 2020 R2 and older that allows an unauthenticated user to read files on the system outside of the secure gateway web server.
CVE-2022-23854 has a severity rating of 7.5 (high).
CVE-2022-23854 affects AVEVA InTouch Access Anywhere versions 2020 R2 and older.
An unauthenticated user with network access can exploit CVE-2022-23854 to perform a path traversal attack and read files on the system outside of the secure gateway web server.
It is recommended to upgrade to a version of AVEVA InTouch Access Anywhere that is not vulnerable to CVE-2022-23854.