In OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, deletion, or modification.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2020-07-24T22:42:39

Updated: 2024-08-04T11:06:10.091Z

Reserved: 2020-03-16T00:00:00

Link: CVE-2020-10610

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-24T23:15:11.940

Modified: 2024-11-21T04:55:41.690

Link: CVE-2020-10610

cve-icon Redhat

No data.