In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2020-07-24T22:46:02

Updated: 2024-08-04T11:06:09.916Z

Reserved: 2020-03-16T00:00:00

Link: CVE-2020-10608

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2020-07-24T23:15:11.877

Modified: 2020-08-05T18:06:30.360

Link: CVE-2020-10608

cve-icon Redhat

No data.