7.8
CVE-2023-6132
- EPSS 0.04%
- Published 29.02.2024 18:15:16
- Last modified 04.03.2025 12:25:10
- Source ics-cert@hq.dhs.gov
- Teams watchlist Login
- Open Login
The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
Data is provided by the National Vulnerability Database (NVD)
Aveva ≫ Platform Common Services Version4.4.6
Aveva ≫ Batch Management Version2020
Aveva ≫ Enterprise Data Management Version2021
Aveva ≫ Manufacturing Execution System Version2020
Aveva ≫ Mobile Operator Version2020 Update-
Aveva ≫ System Platform Version2020 Update-
Aveva ≫ System Platform Version2020 Updater2
Aveva ≫ System Platform Version2020 Updater2_p01
Aveva ≫ Work Tasks Version2020 Update-
Aveva ≫ Work Tasks Version2020 Updateupdate_1
Aveva ≫ Enterprise Data Management Version2021
Aveva ≫ Manufacturing Execution System Version2020
Aveva ≫ Mobile Operator Version2020 Update-
Aveva ≫ System Platform Version2020 Update-
Aveva ≫ System Platform Version2020 Updater2
Aveva ≫ System Platform Version2020 Updater2_p01
Aveva ≫ Work Tasks Version2020 Update-
Aveva ≫ Work Tasks Version2020 Updateupdate_1
Aveva ≫ Platform Common Services Version4.5.0
Aveva ≫ Batch Management Version2020
Aveva ≫ Enterprise Data Management Version2021
Aveva ≫ Manufacturing Execution System Version2020
Aveva ≫ Mobile Operator Version2020 Update-
Aveva ≫ System Platform Version2020 Update-
Aveva ≫ System Platform Version2020 Updater2
Aveva ≫ System Platform Version2020 Updater2_p01
Aveva ≫ Work Tasks Version2020 Update-
Aveva ≫ Work Tasks Version2020 Updateupdate_1
Aveva ≫ Enterprise Data Management Version2021
Aveva ≫ Manufacturing Execution System Version2020
Aveva ≫ Mobile Operator Version2020 Update-
Aveva ≫ System Platform Version2020 Update-
Aveva ≫ System Platform Version2020 Updater2
Aveva ≫ System Platform Version2020 Updater2_p01
Aveva ≫ Work Tasks Version2020 Update-
Aveva ≫ Work Tasks Version2020 Updateupdate_1
Aveva ≫ Platform Common Services Version4.5.1
Aveva ≫ Batch Management Version2020
Aveva ≫ Enterprise Data Management Version2021
Aveva ≫ Manufacturing Execution System Version2020
Aveva ≫ Mobile Operator Version2020 Update-
Aveva ≫ System Platform Version2020 Update-
Aveva ≫ System Platform Version2020 Updater2
Aveva ≫ System Platform Version2020 Updater2_p01
Aveva ≫ Work Tasks Version2020 Update-
Aveva ≫ Work Tasks Version2020 Updateupdate_1
Aveva ≫ Enterprise Data Management Version2021
Aveva ≫ Manufacturing Execution System Version2020
Aveva ≫ Mobile Operator Version2020 Update-
Aveva ≫ System Platform Version2020 Update-
Aveva ≫ System Platform Version2020 Updater2
Aveva ≫ System Platform Version2020 Updater2_p01
Aveva ≫ Work Tasks Version2020 Update-
Aveva ≫ Work Tasks Version2020 Updateupdate_1
Aveva ≫ Platform Common Services Version4.5.2
Aveva ≫ Batch Management Version2020
Aveva ≫ Enterprise Data Management Version2021
Aveva ≫ Manufacturing Execution System Version2020
Aveva ≫ Mobile Operator Version2020 Update-
Aveva ≫ System Platform Version2020 Update-
Aveva ≫ System Platform Version2020 Updater2
Aveva ≫ System Platform Version2020 Updater2_p01
Aveva ≫ Work Tasks Version2020 Update-
Aveva ≫ Work Tasks Version2020 Updateupdate_1
Aveva ≫ Enterprise Data Management Version2021
Aveva ≫ Manufacturing Execution System Version2020
Aveva ≫ Mobile Operator Version2020 Update-
Aveva ≫ System Platform Version2020 Update-
Aveva ≫ System Platform Version2020 Updater2
Aveva ≫ System Platform Version2020 Updater2_p01
Aveva ≫ Work Tasks Version2020 Update-
Aveva ≫ Work Tasks Version2020 Updateupdate_1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.104 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
ics-cert@hq.dhs.gov | 7.3 | 1.3 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.