mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
325 lines
12 KiB
JSON
325 lines
12 KiB
JSON
{
|
|
"id": "CVE-2023-34982",
|
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
|
"published": "2023-11-15T17:15:41.563",
|
|
"lastModified": "2023-12-08T18:53:18.187",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "\nThis external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Esta vulnerabilidad de control externo, si se explota, podr\u00eda permitir que un usuario local autenticado en el sistema operativo con privilegios est\u00e1ndar elimine archivos con privilegios de sistema en la m\u00e1quina donde est\u00e1n instalados estos productos, lo que resultar\u00eda en una denegaci\u00f3n de servicio."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.1,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.2
|
|
},
|
|
{
|
|
"source": "ics-cert@hq.dhs.gov",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 5.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-610"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "ics-cert@hq.dhs.gov",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-73"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:batch_management:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "5C2AEDAE-18DB-40C0-AFB0-57136A822BBE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:batch_management:2020:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F546770E-B402-4577-8E0D-C7D34CFDE549"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:batch_management:2020:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A67B8AC-2282-4F39-9795-D61F48304049"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:communication_drivers:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "D62B3995-706D-4285-A3C7-900ED2D176B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:communication_drivers:2020:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D97EE6DC-CCB3-40FF-BC75-A694DCBCE50D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:communication_drivers:2020:r2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B74F0988-CB5D-4FC4-8CBD-6B43F6CB4C22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:communication_drivers:2020:r2_p01:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B38368FD-D573-4C6A-BBB7-B0CC477C44AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:edge:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "20.1.101",
|
|
"matchCriteriaId": "6CE5AEFF-0C5F-499C-B4AF-3594CC591061"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:enterprise_licensing:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.7.002",
|
|
"matchCriteriaId": "9D63D153-5F92-4732-8CE7-BF821FDC1FFC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:historian:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "310008CD-1FB4-47C3-9B20-1DF0BC537019"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:historian:2020:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33FE93BF-8221-4A84-845B-13693E28F570"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:historian:2020:r2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D479F013-5ABC-4B59-845A-E06EF0ADF107"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:historian:2020:r2_p01:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B67B330-EB63-4026-A961-EA2EE76A8355"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:intouch:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "06F39A93-CE38-4696-A301-3B08BB02AA0F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:intouch:2020:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87B6DFEA-FED8-4A02-B09A-2676D5C8A5DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:intouch:2020:r2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3FDBC50-37E5-4F02-BDAC-22490D139C71"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:intouch:2020:r2_p01:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7D7123E-2439-4325-9733-F10DFF180C35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:manufacturing_execution_system:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "E5519C16-D78F-4B03-BF68-25977782C15C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1288B3F5-2A5F-4516-96F8-FDB33A71060A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:manufacturing_execution_system:2020:p01:*:*:*:*:*:*",
|
|
"matchCriteriaId": "353CAFF0-2928-46F1-B5B5-9F0122BCDF38"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:mobile_operator:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "2244B652-6874-4BD3-9F6A-C01274CE7F25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:mobile_operator:2020:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40D03AD9-31E2-422F-9137-4E881A942C74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9AA5D22-126E-4E0B-AD44-8990B9218AA6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:mobile_operator:2020:r1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "062CEF6D-5308-4CC7-A20A-84298C527C14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:plant_scada:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "63BCBC30-F337-47AB-96F1-54E46F735B1E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:plant_scada:2020:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B493552-4A0D-49DC-8669-C7E714669D98"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:plant_scada:2020:r2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B714DE8-6E27-48ED-8CB5-6FD3DECB8718"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:recipe_management:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "4FF7755E-D26A-4D55-88BB-2811A18C2589"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:recipe_management:2020:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B0AB6DC-D05F-429F-9FEF-500BE9780456"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:recipe_management:2020:update_1_patch_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E69E722-AA58-49BD-9D22-5A6DC40FE85F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:system_platform:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "18048EB2-8F4C-4C75-93BD-0C3D6C42AB4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D47F4B07-B67F-4855-AED2-D17B0E76FA8A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1ED7E9C7-B882-4F57-B796-59A4F90EE185"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33D5FF9C-590D-4BA3-A265-35956E4F36DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:telemetry_server:2020r2:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12AD341A-07AE-4837-A1DC-471FFF0926DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:telemetry_server:2020r2:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62A91A30-CB69-4E14-9C32-BF848E740944"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:work_tasks:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2020",
|
|
"matchCriteriaId": "061DD968-A34E-4AA2-B0EC-ECBAF4B15605"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78E65146-9CB1-423B-A565-48530C453382"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64EF2703-3C49-468A-ADA9-E78173DF4F65"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:aveva:work_tasks:2020:update_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4131B6FF-AF15-4F52-9415-A9E150B169DD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/",
|
|
"source": "ics-cert@hq.dhs.gov",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-318-01",
|
|
"source": "ics-cert@hq.dhs.gov",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
}
|
|
]
|
|
} |