Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-33873

Опубликовано: 15 нояб. 2023
Источник: nvd
CVSS3: 7.8
EPSS Низкий

Описание

This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:aveva:batch_management:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:batch_management:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:batch_management:2020:sp1:*:*:*:*:*:*
cpe:2.3:a:aveva:communication_drivers:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:communication_drivers:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:communication_drivers:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:communication_drivers:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:edge:*:*:*:*:*:*:*:*
Версия до 20.1.101 (включая)
cpe:2.3:a:aveva:enterprise_licensing:*:*:*:*:*:*:*:*
Версия до 3.7.002 (включая)
cpe:2.3:a:aveva:historian:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:historian:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:historian:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:historian:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:intouch:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:intouch:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:intouch:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:intouch:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:manufacturing_execution_system:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:manufacturing_execution_system:2020:p01:*:*:*:*:*:*
cpe:2.3:a:aveva:mobile_operator:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:mobile_operator:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:mobile_operator:2020:r1:*:*:*:*:*:*
cpe:2.3:a:aveva:plant_scada:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:plant_scada:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:plant_scada:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:recipe_management:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:recipe_management:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:recipe_management:2020:update_1_patch_2:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:telemetry_server:2020r2:-:*:*:*:*:*:*
cpe:2.3:a:aveva:telemetry_server:2020r2:sp1:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:2020:update_2:*:*:*:*:*:*

EPSS

Процентиль: 34%
0.00135
Низкий

7.8 High

CVSS3

Дефекты

CWE-250
NVD-CWE-Other

Связанные уязвимости

CVSS3: 7.8
github
около 2 лет назад

This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.

EPSS

Процентиль: 34%
0.00135
Низкий

7.8 High

CVSS3

Дефекты

CWE-250
NVD-CWE-Other