AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.
References
Configurations
Configuration 1 (hide)
|
History
13 Feb 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server. |
21 Nov 2024, 06:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal - | |
References | () https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2023-001_r.pdf - | |
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-342-02 - Third Party Advisory, US Government Resource |
19 Jan 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
Summary | AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server. | |
CPE | cpe:2.3:a:aveva:intouch_access_anywhere:2020:r2:*:*:*:*:*:* cpe:2.3:a:aveva:intouch_access_anywhere:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:intouch_access_anywhere:*:*:*:*:*:*:*:* |
|
References |
|
|
References | (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-342-02 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
23 Dec 2022, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-23 21:15
Updated : 2025-02-13 17:15
NVD link : CVE-2022-23854
Mitre link : CVE-2022-23854
CVE.ORG link : CVE-2022-23854
JSON object : View
Products Affected
aveva
- intouch_access_anywhere