First published: Thu Feb 29 2024(Updated: )
The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
AVEVA Edge 2020 R2 SP1 | ||
All of | ||
Any of | ||
=4.4.6 | ||
=4.5.0 | ||
=4.5.1 | ||
=4.5.2 | ||
Any of | ||
=2020 | ||
=2021 | ||
=2020 | ||
=2020 | ||
=2020 | ||
=2020-r2 | ||
=2020-r2_p01 | ||
=2020 | ||
=2020-update_1 |
AVEVA recommends users upgrade to AVEVA Edge 2023, or AVEVA Edge 2020 R2 SP2 P01 as soon as possible. Upgrades can be downloaded from the AVEVA official website: AVEVA Edge 2023 https://softwaresupportsp.aveva.com/#/producthub/details , AVEVA Edge 2020 R2 SP2 P01 https://softwaresupportsp.aveva.com/#/producthub/details . * Note: Log-in is required. For additional information, please refer to AVEVA's security advisory AVEVA-2024-002. https://www.aveva.com/en/support-and-success/cyber-security-updates/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6132 is classified as a critical vulnerability due to its potential for arbitrary code execution and privilege escalation.
To mitigate CVE-2023-6132, users should update to the latest version of AVEVA Edge that addresses this vulnerability.
CVE-2023-6132 enables a malicious entity to execute arbitrary code and potentially escalate privileges on affected systems.
CVE-2023-6132 affects the AVEVA Edge software, which is used in various industrial control systems.
Yes, if exploited, CVE-2023-6132 can lead to a complete system compromise through unauthorized code execution.