First published: Wed Mar 29 2023(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 20.0 Build: 4201.2111.1802.0000 Service Pack 2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of APP files. Crafted data in a APP file can cause the application to execute arbitrary Visual Basic scripts. The user interface fails to provide sufficient indication of the hazard. An attacker can leverage this vulnerability to execute code in the context of current process. Was ZDI-CAN-17370.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aveva Aveva Edge | <2020.2.00.40 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36970 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 20.0 Build: 4201.2111.1802.0000 Service Pack 2.
CVE-2022-36970 requires user interaction, such as visiting a malicious page or opening a malicious file, to exploit the vulnerability and execute arbitrary code.
The severity of CVE-2022-36970 is high, with a CVSS score of 7.8.
The affected software for CVE-2022-36970 includes AVEVA Edge 20.0 Build: 4201.2111.1802.0000 Service Pack 2.
To fix CVE-2022-36970, it is recommended to apply the necessary security updates provided by AVEVA. Refer to the vendor's security bulletin for more information.