First published: Wed Nov 15 2023(Updated: )
This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Aveva Batch Management | <2020 | |
Aveva Batch Management | =2020 | |
Aveva Batch Management | =2020-sp1 | |
Aveva Communication Drivers | <2020 | |
Aveva Communication Drivers | =2020 | |
Aveva Communication Drivers | =2020-r2 | |
Aveva Communication Drivers | =2020-r2_p01 | |
AVEVA Edge | <=20.1.101 | |
Aveva Enterprise Licensing | <=3.7.002 | |
Aveva Historian | <2020 | |
Aveva Historian | =2020 | |
Aveva Historian | =2020-r2 | |
Aveva Historian | =2020-r2_p01 | |
Aveva Intouch | <2020 | |
Aveva Intouch | =2020 | |
Aveva Intouch | =2020-r2 | |
Aveva Intouch | =2020-r2_p01 | |
Aveva Manufacturing Execution System | <2020 | |
Aveva Manufacturing Execution System | =2020 | |
Aveva Manufacturing Execution System | =2020-p01 | |
Aveva Mobile Operator | <2020 | |
Aveva Mobile Operator | =2020 | |
Aveva Mobile Operator | =2020 | |
Aveva Mobile Operator | =2020-r1 | |
Aveva Plant Scada | <2020 | |
Aveva Plant Scada | =2020 | |
Aveva Plant Scada | =2020-r2 | |
Aveva Recipe Management | <2020 | |
Aveva Recipe Management | =2020 | |
Aveva Recipe Management | =2020-update_1_patch_2 | |
AVEVA System Platform | <2020 | |
AVEVA System Platform | =2020 | |
AVEVA System Platform | =2020-r2 | |
AVEVA System Platform | =2020-r2_p01 | |
AVEVA Telemetry Server | =2020r2 | |
AVEVA Telemetry Server | =2020r2-sp1 | |
Aveva Work Tasks | <2020 | |
Aveva Work Tasks | =2020 | |
Aveva Work Tasks | =2020-update_1 | |
Aveva Work Tasks | =2020-update_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.