Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Telemetry_server
(Aveva)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-03-16 | CVE-2023-1256 | The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server are vulnerable to an improper authorization exploit which could allow an unauthenticated user to remotely read data, cause denial of service, and tamper with alarm states. | Aveva_plant_scada, Telemetry_server | 9.8 | ||
2023-11-15 | CVE-2023-34982 | This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service. | Batch_management, Communication_drivers, Edge, Enterprise_licensing, Historian, Intouch, Manufacturing_execution_system, Mobile_operator, Plant_scada, Recipe_management, System_platform, Telemetry_server, Work_tasks | 7.1 | ||
2023-11-15 | CVE-2023-33873 | This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine. | Batch_management, Communication_drivers, Edge, Enterprise_licensing, Historian, Intouch, Manufacturing_execution_system, Mobile_operator, Plant_scada, Recipe_management, System_platform, Telemetry_server, Work_tasks | 7.8 |