The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
References
Link | Resource |
---|---|
https://www.aveva.com/en/support-and-success/cyber-security-updates/ | Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 | Third Party Advisory US Government Resource |
https://www.aveva.com/en/support-and-success/cyber-security-updates/ | Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
04 Mar 2025, 12:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Aveva manufacturing Execution System
Aveva enterprise Data Management Aveva system Platform Aveva batch Management Aveva platform Common Services Aveva Aveva mobile Operator Aveva work Tasks |
|
CPE | cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:* cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:* cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:* cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:* cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:enterprise_data_management:2021:*:*:*:*:*:*:* cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:* |
|
References | () https://www.aveva.com/en/support-and-success/cyber-security-updates/ - Vendor Advisory | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 - Third Party Advisory, US Government Resource |
21 Nov 2024, 08:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.aveva.com/en/support-and-success/cyber-security-updates/ - | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 - |
01 Mar 2024, 14:04
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Feb 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 18:15
Updated : 2025-03-04 12:25
NVD link : CVE-2023-6132
Mitre link : CVE-2023-6132
CVE.ORG link : CVE-2023-6132
JSON object : View
Products Affected
aveva
- batch_management
- platform_common_services
- manufacturing_execution_system
- mobile_operator
- enterprise_data_management
- system_platform
- work_tasks
CWE
CWE-427
Uncontrolled Search Path Element