The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
References
| Link | Resource |
|---|---|
| https://www.aveva.com/en/support-and-success/cyber-security-updates/ | Vendor Advisory |
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 | Third Party Advisory US Government Resource |
| https://www.aveva.com/en/support-and-success/cyber-security-updates/ | Vendor Advisory |
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-02-29 18:15
Updated : 2025-03-04 12:38
NVD link : CVE-2023-6132
Mitre link : CVE-2023-6132
CVE.ORG link : CVE-2023-6132
JSON object : View
Products Affected
aveva
- work_tasks
- batch_management
- manufacturing_execution_system
- mobile_operator
- system_platform
- platform_common_services
- enterprise_data_management
CWE
CWE-427
Uncontrolled Search Path Element
