5 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 29EXPL: 1

AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. An unauthenticated remote user could use a specially crafted database connection configuration file to execute an arbitrary process on the server machine. InduSoft Web Studio, en versiones anteriores a la 8.1 SP3 e InTouch Edge HMI (anteriormente conocido como InTouch Machine Edition), en versiones anteriores a la 2017 Update, de AVEVA Software, LLC. Un usuario no autenticado remoto podría emplear un archivo de configuración de conexión a la base de datos especialmente manipulado para ejecutar un proceso arbitrario en la máquina del servidor. Indusoft Web Studio version 8.1 SP2 suffers from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/46342 https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01 https://www.tenable.com/security/research/tra-2019-04 • CWE-99: Improper Control of Resource Identifiers ('Resource Injection') •

CVSS: 10.0EPSS: 1%CPEs: 29EXPL: 1

AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. Code is executed under the program runtime privileges, which could lead to the compromise of the machine. InduSoft Web Studio, en versiones anteriores a la 8.1 SP3 e InTouch Edge HMI (anteriormente conocido como InTouch Machine Edition), en versiones anteriores a la 2017 Update, de AVEVA Software, LLC. Se ejecuta código con los privilegios en tiempo de ejecución del programa, lo que podría conducir al compromiso de la máquina. Indusoft Web Studio version 8.1 SP2 suffers from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/46342 https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01 https://www.tenable.com/security/research/tra-2019-04 • CWE-306: Missing Authentication for Critical Function •

CVSS: 10.0EPSS: 2%CPEs: 30EXPL: 1

InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2. A remote attacker could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code to be executed. If InduSoft Web Studio remote communication security was not enabled, or a password was left blank, a remote user could send a carefully crafted packet to invoke an arbitrary process, with potential for code to be executed. The code would be executed under the privileges of the InduSoft Web Studio or InTouch Edge HMI runtime and could lead to a compromise of the InduSoft Web Studio or InTouch Edge HMI server machine. InduSoft Web Studio en versiones anteriores a la 8.1 SP2 e InTouch Edge HMI (anteriormente llamado InTouch Machine Edition) en versiones anteriores a la 2017 SP2. • https://ics-cert.us-cert.gov/advisories/ICSA-18-305-01 https://www.tenable.com/security/research/tra-2018-34 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 0%CPEs: 30EXPL: 1

InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2. This vulnerability could allow an unauthenticated user to remotely execute code with the same privileges as that of the InduSoft Web Studio or InTouch Edge HMI (formerly InTouch Machine Edition) runtime. InduSoft Web Studio en versiones anteriores a la 8.1 SP2 e InTouch Edge HMI (anteriormente llamado InTouch Machine Edition) en versiones anteriores a la 2017 SP2. Esta vulnerabilidad podría permitir que un usuario no autenticado ejecute código remotamente con los mismos privilegios que los del tiempo de ejecución de InduSoft Web Studio o InTouch Edge HMI (anteriormente InTouch Machine Edition). • https://ics-cert.us-cert.gov/advisories/ICSA-18-305-01 https://www.tenable.com/security/research/tra-2018-34 • CWE-258: Empty Password in Configuration File •

CVSS: 9.8EPSS: 3%CPEs: 5EXPL: 0

AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process. AVEVA InTouch 2014 R2 SP1 y anteriores, InTouch 2017, InTouch 2017 Update 1 e InTouch 2017 Update 2 permiten que un usuario no autenticado envíe un paquete especialmente manipulado que podría sobrescribir el búfer en un locale que no emplea un separador de punto flotante. Su explotación podría permitir la ejecución remota de código bajo los privilegios del proceso InTouch View. • http://www.securityfocus.com/bid/104864 https://ics-cert.us-cert.gov/advisories/ICSA-18-200-02 https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec127%28003%29.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •