CVE-2021-42794

An issue was discovered in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior. The application allows a client to provide a malicious connection string that could allow an adversary to port scan the LAN, depending on the hosts' responses.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:aveva:edge:*:*:*:*:*:*:*:*
cpe:2.3:a:aveva:edge:2020:-:*:*:*:*:*:*
cpe:2.3:a:aveva:edge:2020:r2:-:*:*:*:*:*
cpe:2.3:a:aveva:edge:2020:r2:sp1:*:*:*:*:*

History

20 Dec 2023, 16:16

Type Values Removed Values Added
CPE cpe:2.3:a:aveva:edge:2020:r2:-:*:*:*:*:*
cpe:2.3:a:aveva:edge:2020:r2:sp1:*:*:*:*:*
cpe:2.3:a:aveva:edge:*:*:*:*:*:*:*:*
cpe:2.3:a:aveva:edge:2020:-:*:*:*:*:*:*
Summary
  • (es) Se descubrió un problema en las versiones R2020 y anteriores de AVEVA Edge (anteriormente InduSoft Web Studio). La aplicación permite a un cliente proporcionar una cadena de conexión maliciosa que podría permitir a un adversario escanear puertos de la LAN, dependiendo de las respuestas de los hosts.
References () https://www.aveva.com/en/products/edge/ - () https://www.aveva.com/en/products/edge/ - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-01 - Third Party Advisory, US Government Resource
References () https://www.exploit-db.com/docs/english/17254-connection-string-parameter-pollution-attacks.pdf - () https://www.exploit-db.com/docs/english/17254-connection-string-parameter-pollution-attacks.pdf - Exploit, Third Party Advisory, VDB Entry
CWE NVD-CWE-noinfo
First Time Aveva
Aveva edge

16 Dec 2023, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-16 01:15

Updated : 2023-12-20 16:16


NVD link : CVE-2021-42794

Mitre link : CVE-2021-42794

CVE.ORG link : CVE-2021-42794


JSON object : View

Products Affected

aveva

  • edge