Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-34982

Опубликовано: 15 нояб. 2023
Источник: nvd
CVSS3: 5.5
CVSS3: 7.1
EPSS Низкий

Описание

This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:aveva:batch_management:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:batch_management:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:batch_management:2020:sp1:*:*:*:*:*:*
cpe:2.3:a:aveva:communication_drivers:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:communication_drivers:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:communication_drivers:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:communication_drivers:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:edge:*:*:*:*:*:*:*:*
Версия до 20.1.101 (включая)
cpe:2.3:a:aveva:enterprise_licensing:*:*:*:*:*:*:*:*
Версия до 3.7.002 (включая)
cpe:2.3:a:aveva:historian:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:historian:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:historian:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:historian:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:intouch:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:intouch:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:intouch:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:intouch:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:manufacturing_execution_system:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:manufacturing_execution_system:2020:p01:*:*:*:*:*:*
cpe:2.3:a:aveva:mobile_operator:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:mobile_operator:2020:*:*:*:*:*:*:*
cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:mobile_operator:2020:r1:*:*:*:*:*:*
cpe:2.3:a:aveva:plant_scada:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:plant_scada:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:plant_scada:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:recipe_management:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:recipe_management:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:recipe_management:2020:update_1_patch_2:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*
cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*
cpe:2.3:a:aveva:telemetry_server:2020r2:-:*:*:*:*:*:*
cpe:2.3:a:aveva:telemetry_server:2020r2:sp1:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:*:*:*:*:*:*:*:*
Версия до 2020 (исключая)
cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*
cpe:2.3:a:aveva:work_tasks:2020:update_2:*:*:*:*:*:*

EPSS

Процентиль: 25%
0.00089
Низкий

5.5 Medium

CVSS3

7.1 High

CVSS3

Дефекты

CWE-73
CWE-610

Связанные уязвимости

CVSS3: 5.5
github
около 2 лет назад

This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.

EPSS

Процентиль: 25%
0.00089
Низкий

5.5 Medium

CVSS3

7.1 High

CVSS3

Дефекты

CWE-73
CWE-610