CVE-2021-38410

AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:enterprise_data_management:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:mobile_operator:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*

History

21 Nov 2024, 06:17

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.3
References () https://www.aveva.com/en/support-and-success/cyber-security-updates/ - Vendor Advisory () https://www.aveva.com/en/support-and-success/cyber-security-updates/ - Vendor Advisory
References () https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01 - Third Party Advisory, US Government Resource

04 Aug 2022, 02:48

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:enterprise_data_management:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*
cpe:2.3:a:aveva:mobile_operator:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*
CWE CWE-427
References (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01 - (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01 - Third Party Advisory, US Government Resource
References (CONFIRM) https://www.aveva.com/en/support-and-success/cyber-security-updates/ - (CONFIRM) https://www.aveva.com/en/support-and-success/cyber-security-updates/ - Vendor Advisory

27 Jul 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-27 21:15

Updated : 2024-11-21 06:17


NVD link : CVE-2021-38410

Mitre link : CVE-2021-38410

CVE.ORG link : CVE-2021-38410


JSON object : View

Products Affected

aveva

  • manufacturing_execution_system
  • platform_common_services
  • system_platform
  • work_tasks
  • mobile_operator
  • batch_management
  • enterprise_data_management
CWE
CWE-427

Uncontrolled Search Path Element