CVE-2022-23854
Severity CVSS v4.0:
Pending analysis
Type:
CWE-23
Relative Path Traversal
Publication date:
23/12/2022
Last modified:
13/02/2025
Description
AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:aveva:intouch_access_anywhere:*:*:*:*:*:*:*:* | 2020 (excluding) | |
| cpe:2.3:a:aveva:intouch_access_anywhere:2020:-:*:*:*:*:*:* | ||
| cpe:2.3:a:aveva:intouch_access_anywhere:2020:r2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal
- https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2023-001_r.pdf
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-342-02
- https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal
- https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2023-001_r.pdf
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-342-02



