AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.
References
Link | Resource |
---|---|
https://www.aveva.com/en/support-and-success/cyber-security-updates/ | Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01 | Third Party Advisory US Government Resource |
https://www.aveva.com/en/support-and-success/cyber-security-updates/ | Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
References | () https://www.aveva.com/en/support-and-success/cyber-security-updates/ - Vendor Advisory | |
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01 - Third Party Advisory, US Government Resource |
Information
Published : 2022-07-27 21:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38410
Mitre link : CVE-2021-38410
CVE.ORG link : CVE-2021-38410
JSON object : View
Products Affected
aveva
- mobile_operator
- system_platform
- enterprise_data_management
- manufacturing_execution_system
- work_tasks
- platform_common_services
- batch_management
CWE
CWE-427
Uncontrolled Search Path Element