In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2020-07-24T22:46:02
Updated: 2024-08-04T11:06:09.916Z
Reserved: 2020-03-16T00:00:00
Link: CVE-2020-10608
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-07-24T23:15:11.877
Modified: 2024-11-21T04:55:41.463
Link: CVE-2020-10608
Redhat
No data.