7.8
CVE-2020-10608
- EPSS 0.03%
- Veröffentlicht 24.07.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:55:41
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Osisoft ≫ Pi Buffer Subsystem Version <= 4.8.0.18
Osisoft ≫ Pi Connector SwPlatformping Version <= 1.0.0.54
Osisoft ≫ Pi Connector SwPlatformethernet/ip Version <= 1.1.0.10
Osisoft ≫ Pi Connector SwPlatformbacnet Version <= 1.2.0.6
Osisoft ≫ Pi Connector SwPlatformdc_systems_rtscada Version <= 1.2.0.42
Osisoft ≫ Pi Connector SwPlatformsiemens_simatic_pcs_7 Version <= 1.2.1.71
Osisoft ≫ Pi Connector SwPlatformiec_60870-5-104 Version <= 1.2.2.79
Osisoft ≫ Pi Connector SwPlatformhart-ip Version <= 1.3.0.1
Osisoft ≫ Pi Connector SwPlatformopc-ua Version <= 1.3.0.130
Osisoft ≫ Pi Connector SwPlatformufl Version <= 1.3.1.135
Osisoft ≫ Pi Connector SwPlatformcygnet Version <= 1.4.0.17
Osisoft ≫ Pi Connector SwPlatformwonderware_historian Version <= 1.5.0.88
Osisoft ≫ Pi Connector Relay Version <= 2.5.19.0
Osisoft ≫ Pi Data Archive Version <= 3.4.430.460
Osisoft ≫ Pi Data Collection Manager Version <= 2.5.19.0
Osisoft ≫ Pi Integrator SwPlatformbusiness_analytics Version <= 2.2.0.183
Osisoft ≫ Pi Interface Configuration Utility Version <= 1.5.0.7
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.081 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
CWE-347 Improper Verification of Cryptographic Signature
The product does not verify, or incorrectly verifies, the cryptographic signature for data.