In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02 Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2020-07-24T22:55:32

Updated: 2020-07-24T22:55:32

Reserved: 2020-03-16T00:00:00


Link: CVE-2020-10606

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-07-24T23:15:11.830

Modified: 2020-08-05T17:57:44.737


Link: CVE-2020-10606

JSON object: View

cve-icon Redhat Information

No data.

CWE