CVE-2022-44725

OPC Foundation Local Discovery Server (LDS) through 1.04.403.478 uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user).
Configurations

Configuration 1 (hide)

cpe:2.3:a:opcfoundation:local_discovery_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:28

Type Values Removed Values Added
References () https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-44725.pdf - Patch, Vendor Advisory () https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-44725.pdf - Patch, Vendor Advisory
References () https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/ - Patch, Vendor Advisory () https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/ - Patch, Vendor Advisory

Information

Published : 2022-11-17 22:15

Updated : 2024-11-21 07:28


NVD link : CVE-2022-44725

Mitre link : CVE-2022-44725

CVE.ORG link : CVE-2022-44725


JSON object : View

Products Affected

opcfoundation

  • local_discovery_server
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource