In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2020-07-24T22:55:32
Updated: 2020-07-24T22:55:32
Reserved: 2020-03-16T00:00:00
Link: CVE-2020-10606
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-07-24T23:15:11.830
Modified: 2020-08-05T17:57:44.737
Link: CVE-2020-10606
JSON object: View
Redhat Information
No data.
CWE