OPC Foundation Local Discovery Server (LDS) through 1.04.403.478 uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user).
References
Link | Resource |
---|---|
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-44725.pdf | Patch Vendor Advisory |
https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/ | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-11-17T00:00:00
Updated: 2022-11-17T00:00:00
Reserved: 2022-11-04T00:00:00
Link: CVE-2022-44725
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-11-17T22:15:11.093
Modified: 2022-11-22T18:00:56.177
Link: CVE-2022-44725
JSON object: View
Redhat Information
No data.
CWE