The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
References
Configurations
No configuration.
History
21 Nov 2024, 08:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.aveva.com/en/support-and-success/cyber-security-updates/ - | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03 - |
01 Mar 2024, 14:04
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Feb 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 18:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6132
Mitre link : CVE-2023-6132
CVE.ORG link : CVE-2023-6132
JSON object : View
Products Affected
No product.
CWE
CWE-427
Uncontrolled Search Path Element