The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.aveva.com/en/support-and-success/cyber-security-updates/ | Vendor Advisory | 
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 | Third Party Advisory US Government Resource | 
| https://www.aveva.com/en/support-and-success/cyber-security-updates/ | Vendor Advisory | 
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    04 Mar 2025, 12:25
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:* cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:* cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:* cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:* cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:enterprise_data_management:2021:*:*:*:*:*:*:* cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:* | |
| References | () https://www.aveva.com/en/support-and-success/cyber-security-updates/ - Vendor Advisory | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 - Third Party Advisory, US Government Resource | |
| First Time | Aveva manufacturing Execution System Aveva enterprise Data Management Aveva system Platform Aveva batch Management Aveva platform Common Services Aveva Aveva mobile Operator Aveva work Tasks | 
21 Nov 2024, 08:43
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.aveva.com/en/support-and-success/cyber-security-updates/ - | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 - | 
01 Mar 2024, 14:04
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
29 Feb 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-02-29 18:15
Updated : 2025-03-04 12:25
NVD link : CVE-2023-6132
Mitre link : CVE-2023-6132
CVE.ORG link : CVE-2023-6132
JSON object : View
Products Affected
                aveva
- manufacturing_execution_system
- platform_common_services
- mobile_operator
- batch_management
- enterprise_data_management
- work_tasks
- system_platform
CWE
                
                    
                        
                        CWE-427
                        
            Uncontrolled Search Path Element
