7.1
CVE-2023-34982
- EPSS 0.09%
- Published 15.11.2023 17:15:41
- Last modified 21.11.2024 08:07:46
- Source ics-cert@hq.dhs.gov
- Teams watchlist Login
- Open Login
This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.
Data is provided by the National Vulnerability Database (NVD)
Aveva ≫ Batch Management Version < 2020
Aveva ≫ Batch Management Version2020 Update-
Aveva ≫ Batch Management Version2020 Updatesp1
Aveva ≫ Communication Drivers Version < 2020
Aveva ≫ Communication Drivers Version2020 Update-
Aveva ≫ Communication Drivers Version2020 Updater2
Aveva ≫ Communication Drivers Version2020 Updater2_p01
Aveva ≫ Enterprise Licensing Version <= 3.7.002
Aveva ≫ Manufacturing Execution System Version < 2020
Aveva ≫ Manufacturing Execution System Version2020
Aveva ≫ Manufacturing Execution System Version2020 Updatep01
Aveva ≫ Mobile Operator Version < 2020
Aveva ≫ Mobile Operator Version2020
Aveva ≫ Mobile Operator Version2020 Update-
Aveva ≫ Mobile Operator Version2020 Updater1
Aveva ≫ Plant Scada Version < 2020
Aveva ≫ Plant Scada Version2020 Update-
Aveva ≫ Plant Scada Version2020 Updater2
Aveva ≫ Recipe Management Version < 2020
Aveva ≫ Recipe Management Version2020 Update-
Aveva ≫ Recipe Management Version2020 Updateupdate_1_patch_2
Aveva ≫ System Platform Version < 2020
Aveva ≫ System Platform Version2020 Update-
Aveva ≫ System Platform Version2020 Updater2
Aveva ≫ System Platform Version2020 Updater2_p01
Aveva ≫ Telemetry Server Version2020r2 Update-
Aveva ≫ Telemetry Server Version2020r2 Updatesp1
Aveva ≫ Work Tasks Version < 2020
Aveva ≫ Work Tasks Version2020 Update-
Aveva ≫ Work Tasks Version2020 Updateupdate_1
Aveva ≫ Work Tasks Version2020 Updateupdate_2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.09% | 0.266 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.1 | 1.8 | 5.2 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
|
ics-cert@hq.dhs.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-610 Externally Controlled Reference to a Resource in Another Sphere
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
CWE-73 External Control of File Name or Path
The product allows user input to control or influence paths or file names that are used in filesystem operations.