CVE-2019-6543

AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. Code is executed under the program runtime privileges, which could lead to the compromise of the machine.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01 Third Party Advisory US Government Resource
https://www.exploit-db.com/exploits/46342/ Exploit Third Party Advisory VDB Entry
https://www.tenable.com/security/research/tra-2019-04 Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01 Third Party Advisory US Government Resource
https://www.exploit-db.com/exploits/46342/ Exploit Third Party Advisory VDB Entry
https://www.tenable.com/security/research/tra-2019-04 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:aveva:indusoft_web_studio:6.1:sp5:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:6.1:sp6_p3:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:*:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp1:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp2:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p1:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p2:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p3:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p4:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p5:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p6:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p7:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p8:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p9:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.0:*:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.0:p1:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.0:p2:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.0:p3:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.0:sp1:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.0:sp1_p1:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.0:sp2:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.0:sp2_p1:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.1:*:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.1:p1:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.1:sp1:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.1:sp1_p1:*:*:*:*:*:*
cpe:2.3:a:aveva:indusoft_web_studio:8.1:sp2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:aveva:intouch_machine_edition_2014:r2:*:*:*:*:*:*:*

History

21 Nov 2024, 04:46

Type Values Removed Values Added
References () https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01 - Third Party Advisory, US Government Resource
References () https://www.exploit-db.com/exploits/46342/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/46342/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.tenable.com/security/research/tra-2019-04 - Third Party Advisory () https://www.tenable.com/security/research/tra-2019-04 - Third Party Advisory

Information

Published : 2019-02-13 01:29

Updated : 2024-11-21 04:46


NVD link : CVE-2019-6543

Mitre link : CVE-2019-6543

CVE.ORG link : CVE-2019-6543


JSON object : View

Products Affected

aveva

  • intouch_machine_edition_2014
  • indusoft_web_studio
CWE
CWE-306

Missing Authentication for Critical Function