"value":"A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation."
"value":"<span style=\"background-color: rgb(255, 255, 255);\">Open Automation Software recommends users upgrade OAS to V20.00.0076 or later. The upgrade can be </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://openautomationsoftware.com/downloads/\">downloaded from the Open Automation Software website</a><span style=\"background-color: rgb(255, 255, 255);\">.</span>\n\n<br>"
}
],
"value":"Open Automation Software recommends users upgrade OAS to V20.00.0076 or later. The upgrade can be downloaded from the Open Automation Software website https://openautomationsoftware.com/downloads/ ."
}
],
"credits":[
{
"lang":"en",
"value":"elcazator of Elex Feigong Research Institute of Elex CyberSecurity Inc. reported this vulnerability to CISA."