Page 4 of 62 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2022-005.pdf https://www.zerodayinitiative.com/advisories/ZDI-22-1127 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to disclose sensitive information on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the LoadImportedLibraries method. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. • https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2022-005.pdf https://www.zerodayinitiative.com/advisories/ZDI-22-1128 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 20.0 Build: 4201.2111.1802.0000 Service Pack 2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of APP files. Crafted data in a APP file can cause the application to execute arbitrary Visual Basic scripts. The user interface fails to provide sufficient indication of the hazard. • https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2022-005.pdf https://www.zerodayinitiative.com/advisories/ZDI-22-1129 • CWE-356: Product UI does not Warn User of Unsafe Actions •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path. AVEVA Software Platform Common Services (PCS) Portal versiones 4.5.2, 4.5.1, 4.5.0 y 4.4.6, son vulnerables a un secuestro de DLL mediante un elemento de ruta de búsqueda no controlado, que puede permitir a un atacante el control de una o más ubicaciones en la ruta de búsqueda • https://www.aveva.com/en/support-and-success/cyber-security-updates https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01 • CWE-427: Uncontrolled Search Path Element •

CVSS: 9.9EPSS: 0%CPEs: 2EXPL: 0

Windows OS can be configured to overlay a “language bar” on top of any application. When this OS functionality is enabled, the OS language bar UI will be viewable in the browser alongside the AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere applications. It is possible to manipulate the Windows OS language bar to launch an OS command prompt, resulting in a context-escape from application into OS. El Sistema Operativo Windows puede configurarse para superponer "language bar" sobre cualquier aplicación. Cuando esta funcionalidad del SO está habilitada, la UI de la barra de lenguaje del SO será visible en el navegador junto a las aplicaciones AVEVA InTouch Access Anywhere y Plant SCADA Access Anywhere. • https://www.aveva.com/en/support-and-success/cyber-security-updates https://www.cisa.gov/uscert/ics/advisories/icsa-22-130-05 • CWE-668: Exposure of Resource to Wrong Sphere •