The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Aveva
Aveva batch Management Aveva enterprise Data Management Aveva manufacturing Execution System Aveva mobile Operator Aveva platform Common Services Aveva system Platform Aveva work Tasks |
|
CPEs | cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:* cpe:2.3:a:aveva:enterprise_data_management:2021:*:*:*:*:*:*:* cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:* cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:* cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:* cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:* cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:* cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:* cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:* |
|
Vendors & Products |
Aveva
Aveva batch Management Aveva enterprise Data Management Aveva manufacturing Execution System Aveva mobile Operator Aveva platform Common Services Aveva system Platform Aveva work Tasks |

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-22T18:02:51.796Z
Reserved: 2023-11-14T16:29:50.706Z
Link: CVE-2023-6132

Updated: 2024-08-02T08:21:17.249Z

Status : Analyzed
Published: 2024-02-29T18:15:16.283
Modified: 2025-03-04T12:25:10.853
Link: CVE-2023-6132

No data.