CVE-2022-23854

AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:aveva:intouch_access_anywhere:*:*:*:*:*:*:*:*
cpe:2.3:a:aveva:intouch_access_anywhere:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:intouch_access_anywhere:2020:r2:*:*:*:*:*:*

History

19 Jan 2024, 19:15

Type Values Removed Values Added
References
  • () https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal -
  • () https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2023-001_r.pdf -
Summary
  • (es) AVEVA InTouch Access Anywhere versiones 2020 R2 y anteriores son vulnerables a una explotación de path traversal que podría permitir a un usuario no autenticado con acceso a la red leer archivos en el sistema fuera del servidor web de puerta de enlace segura.

Information

Published : 2022-12-23 21:15

Updated : 2024-01-19 19:15


NVD link : CVE-2022-23854

Mitre link : CVE-2022-23854

CVE.ORG link : CVE-2022-23854


JSON object : View

Products Affected

aveva

  • intouch_access_anywhere
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal