7.1
CWE
73 610
Advisory Published
Updated

CVE-2023-34982: AVEVA Operations Control Logger External Control of File Name or Path

First published: Wed Nov 15 2023(Updated: )

This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Aveva Batch Management<2020
Aveva Batch Management=2020
Aveva Batch Management=2020-sp1
Aveva Communication Drivers<2020
Aveva Communication Drivers=2020
Aveva Communication Drivers=2020-r2
Aveva Communication Drivers=2020-r2_p01
AVEVA Edge<=20.1.101
Aveva Enterprise Licensing<=3.7.002
Aveva Historian<2020
Aveva Historian=2020
Aveva Historian=2020-r2
Aveva Historian=2020-r2_p01
Aveva Intouch<2020
Aveva Intouch=2020
Aveva Intouch=2020-r2
Aveva Intouch=2020-r2_p01
Aveva Manufacturing Execution System<2020
Aveva Manufacturing Execution System=2020
Aveva Manufacturing Execution System=2020-p01
Aveva Mobile Operator<2020
Aveva Mobile Operator=2020
Aveva Mobile Operator=2020
Aveva Mobile Operator=2020-r1
Aveva Plant Scada<2020
Aveva Plant Scada=2020
Aveva Plant Scada=2020-r2
Aveva Recipe Management<2020
Aveva Recipe Management=2020
Aveva Recipe Management=2020-update_1_patch_2
AVEVA System Platform<2020
AVEVA System Platform=2020
AVEVA System Platform=2020-r2
AVEVA System Platform=2020-r2_p01
AVEVA Telemetry Server=2020r2
AVEVA Telemetry Server=2020r2-sp1
Aveva Work Tasks<2020
Aveva Work Tasks=2020
Aveva Work Tasks=2020-update_1
Aveva Work Tasks=2020-update_2

Remedy

AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users of affected products should apply security updates as soon as possible. In addition to applying security updates, users should follow these general precautions: * Ensure that Guest or Anonymous local OS accounts are disabled. * Ensure that only trusted users are able to login on the nodes where the Operations Control Logger is running. Please see AVEVA Security Bulletin number AVEVA-2023-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/  for more information and for links for individual security updates and mitigations for each of the affected products. AVEVA System Platform 2020 through 2020 R2 SP1 cannot be newly installed on top of other AVEVA products which have been previously patched with the Operations Control Logger v22.1. For additional details please refer to Alert 000038736. https://softwaresupportsp.aveva.com/#/knowledgebase/details/000038736

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203