7.5
CWE
703 755 754
Advisory Published
Updated

CVE-2023-34348: Improper Check or Handling of Exceptional Conditions in Aveva PI Server

First published: Thu Jan 18 2024(Updated: )

AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
AVEVA PI Server<2018
AVEVA PI Server=2018
AVEVA PI Server=2018-sp3_patch_5
AVEVA PI Server=2023

Remedy

All affected versions can be fixed by upgrading to AVEVA PI Server version 2023 Patch 1 or later. From OSI Soft Customer Portal https://my.osisoft.com/ , search for “PI Server” and select version “2023 Patch 1”. For an alternative fix, AVEVA PI Server 2018 SP3 Patch 5 and prior can be fixed by deploying AVEVA PI Server version 2018 SP3 Patch 6 or later. From OSI Soft Customer Portal https://my.osisoft.com/ , search for “PI Server” and select version “2018 SP3 Patch 6”. AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible. AVEVA recommends the following defensive measures: * Set the PI Message Subsystem to auto restart. * Monitor the memory usage of the PI Message Subsystem. * Limit network access to port 5450 to trusted workstations and software * Confirm that only authorized users have access to write to the PI Server Message Log. This is done through configuration of the PIMSGSS entry within the Database Security plugin accessible through PI System Management Tools. For more information on this vulnerability, including security updates, users should see security bulletin AVEVA-2024-001 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-001.pdf .

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-34348?

    CVE-2023-34348 is considered a high severity vulnerability due to its potential to allow remote denial-of-service attacks.

  • How do I fix CVE-2023-34348?

    To mitigate CVE-2023-34348, it is recommended to upgrade to a patched version of AVEVA PI Server 2023 or 2018 SP3 P06 and above.

  • What impact does CVE-2023-34348 have on AVEVA PI Server?

    CVE-2023-34348 can allow an unauthenticated user to remotely crash the PI Message Subsystem, resulting in a denial-of-service condition.

  • Which AVEVA PI Server versions are affected by CVE-2023-34348?

    CVE-2023-34348 affects AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior.

  • Can CVE-2023-34348 be exploited remotely?

    Yes, CVE-2023-34348 can be exploited remotely by unauthenticated users to cause a service disruption.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203