Логотип exploitDog
bind:CVE-2023-38124
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-38124

Количество 3

Количество 3

nvd логотип

CVE-2023-38124

почти 2 года назад

Inductive Automation Ignition OPC UA Quick Client Task Scheduling Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The specific flaw exists within the Ignition Gateway server. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20541.

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-fj6x-xhq4-hq99

почти 2 года назад

Inductive Automation Ignition OPC UA Quick Client Task Scheduling Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The specific flaw exists within the Ignition Gateway server. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20541.

CVSS3: 7.2
EPSS: Средний
fstec логотип

BDU:2023-06523

почти 3 года назад

Уязвимость веб-сервера программного обеспечения для промышленной автоматизации Inductive Automation Ignition, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-38124

Inductive Automation Ignition OPC UA Quick Client Task Scheduling Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The specific flaw exists within the Ignition Gateway server. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20541.

CVSS3: 8.8
54%
Средний
почти 2 года назад
github логотип
GHSA-fj6x-xhq4-hq99

Inductive Automation Ignition OPC UA Quick Client Task Scheduling Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The specific flaw exists within the Ignition Gateway server. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20541.

CVSS3: 7.2
54%
Средний
почти 2 года назад
fstec логотип
BDU:2023-06523

Уязвимость веб-сервера программного обеспечения для промышленной автоматизации Inductive Automation Ignition, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
54%
Средний
почти 3 года назад

Уязвимостей на страницу