CVE-2023-6132
Severity CVSS v4.0:
Pending analysis
Type:
CWE-427
Uncontrolled Search Path Element
Publication date:
29/02/2024
Last modified:
04/03/2025
Description
<br />
The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.<br />
<br />
Impact
Base Score 3.x
7.30
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:enterprise_data_management:2021:*:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:* | ||
cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page