First published: Wed Nov 15 2023(Updated: )
This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
AVEVA Batch Management | <2020 | |
AVEVA Batch Management | =2020 | |
AVEVA Batch Management | =2020-sp1 | |
AVEVA Communication Drivers Pack | <2020 | |
AVEVA Communication Drivers Pack | =2020 | |
AVEVA Communication Drivers Pack | =2020-r2 | |
AVEVA Communication Drivers Pack | =2020-r2_p01 | |
AVEVA Edge 2020 R2 SP1 | <=20.1.101 | |
AVEVA AVEVA Enterprise Licensing | <=3.7.002 | |
AVEVA Historian Server | <2020 | |
AVEVA Historian Server | =2020 | |
AVEVA Historian Server | =2020-r2 | |
AVEVA Historian Server | =2020-r2_p01 | |
AVEVA InTouch 2014 | <2020 | |
AVEVA InTouch 2014 | =2020 | |
AVEVA InTouch 2014 | =2020-r2 | |
AVEVA InTouch 2014 | =2020-r2_p01 | |
AVEVA Manufacturing Execution System | <2020 | |
AVEVA Manufacturing Execution System | =2020 | |
AVEVA Manufacturing Execution System | =2020-p01 | |
AVEVA AVEVA Mobile Operator | <2020 | |
AVEVA AVEVA Mobile Operator | =2020 | |
AVEVA AVEVA Mobile Operator | =2020 | |
AVEVA AVEVA Mobile Operator | =2020-r1 | |
AVEVA Plant SCADA | <2020 | |
AVEVA Plant SCADA | =2020 | |
AVEVA Plant SCADA | =2020-r2 | |
AVEVA Recipe Management | <2020 | |
AVEVA Recipe Management | =2020 | |
AVEVA Recipe Management | =2020-update_1_patch_2 | |
AVEVA System Platform 2020 R2 P01 | <2020 | |
AVEVA System Platform 2020 R2 P01 | =2020 | |
AVEVA System Platform 2020 R2 P01 | =2020-r2 | |
AVEVA System Platform 2020 R2 P01 | =2020-r2_p01 | |
AVEVA Telemetry Server 2020 R2 SP1 | =2020r2 | |
AVEVA Telemetry Server 2020 R2 SP1 | =2020r2-sp1 | |
Aveva Work Tasks | <2020 | |
Aveva Work Tasks | =2020 | |
Aveva Work Tasks | =2020-update_1 | |
Aveva Work Tasks | =2020-update_2 |
AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users of affected products should apply security updates as soon as possible. In addition to applying security updates, users should follow these general precautions: * Ensure that Guest or Anonymous local OS accounts are disabled. * Ensure that only trusted users are able to login on the nodes where the Operations Control Logger is running. Please see AVEVA Security Bulletin number AVEVA-2023-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/ for more information and for links for individual security updates and mitigations for each of the affected products. AVEVA System Platform 2020 through 2020 R2 SP1 cannot be newly installed on top of other AVEVA products which have been previously patched with the Operations Control Logger v22.1. For additional details please refer to Alert 000038736. https://softwaresupportsp.aveva.com/#/knowledgebase/details/000038736
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34982 has a high severity rating due to its potential for local authenticated users to delete files with system privileges.
To remediate CVE-2023-34982, apply the latest security patches provided by Aveva for the affected software versions.
CVE-2023-34982 affects various Aveva products including Batch Management, Communication Drivers, Edge, Historian, and System Platform.
Yes, exploiting CVE-2023-34982 can result in denial of service by allowing unauthorized file deletions.
Local OS-authenticated users with standard privileges are vulnerable to the exploitation of CVE-2023-34982.