"value":"\nThe vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.\n\n"
"value":"\n\n<p>AVEVA recommends users upgrade to AVEVA Edge 2023, or AVEVA Edge 2020 R2 SP2 P01 as soon as possible. Upgrades can be downloaded from the AVEVA official website: <a target=\"_blank\" rel=\"nofollow\" href=\"https://softwaresupportsp.aveva.com/#/producthub/details?id=0c8abaf3-2e4c-4be1-aa78-3ad445c58a16\">AVEVA Edge 2023</a>, <a target=\"_blank\" rel=\"nofollow\" href=\"https://softwaresupportsp.aveva.com/#/producthub/details?id=1e5d9950-d945-4bab-984b-245fe3f152ac\">AVEVA Edge 2020 R2 SP2 P01</a>.</p><ul><li>Note: Log-in is required.</li></ul><p>For additional information, please refer to AVEVA's security advisory <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\">AVEVA-2024-002.</a></p>\n\n<br>"
}
],
"value":"\nAVEVA recommends users upgrade to AVEVA Edge 2023, or AVEVA Edge 2020 R2 SP2 P01 as soon as possible. Upgrades can be downloaded from the AVEVA official website: AVEVA Edge 2023 https://softwaresupportsp.aveva.com/#/producthub/details , AVEVA Edge 2020 R2 SP2 P01 https://softwaresupportsp.aveva.com/#/producthub/details .\n\n * Note: Log-in is required.\n\n\nFor additional information, please refer to AVEVA's security advisory AVEVA-2024-002. https://www.aveva.com/en/support-and-success/cyber-security-updates/ \n\n\n\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"Ting Chen of UESTC discovered and disclosed this vulnerability to AVEVA. "
},
{
"lang":"en",
"value":"ADLab of Venustech discovered and disclosed this vulnerability to AVEVA."