7.3
CVE-2023-29444
- EPSS 0.03%
- Veröffentlicht 10.01.2024 17:15:08
- Zuletzt bearbeitet 21.11.2024 07:57:04
- Quelle ot-cert@dragos.com
- CVE-Watchlists
- Unerledigt
An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM. Alternatively, they could host a trojanized version of the software and trick victims into downloading and installing their malicious version to gain initial access and code execution.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ptc ≫ Kepware Kepserverex Version >= 6.0.2107.0 <= 6.14.263.0
Ptc ≫ Thingworx Kepware Server Version >= 6.8 <= 6.14.263.0
Ptc ≫ Thingworx Industrial Connectivity Version >= 8.0 <= 8.5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.08 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.3 | 1.3 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
| ot-cert@dragos.com | 6.3 | 0.3 | 5.9 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.