In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02 - Third Party Advisory, US Government Resource |
Information
Published : 2020-07-24 23:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10608
Mitre link : CVE-2020-10608
CVE.ORG link : CVE-2020-10608
JSON object : View
Products Affected
osisoft
- pi_data_collection_manager
- pi_connector
- pi_connector_relay
- pi_api
- pi_to_ocs
- pi_integrator
- pi_buffer_subsystem
- pi_data_archive
- pi_interface_configuration_utility
CWE
CWE-347
Improper Verification of Cryptographic Signature