A remote attacker with write access to PI ProcessBook files could inject code that is imported into OSIsoft PI Vision 2020 versions prior to 3.5.0. Unauthorized information disclosure, modification, or deletion is also possible if a victim views or interacts with the infected display. This vulnerability affects PI System data and other data accessible with victim’s user permissions.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-17854 A remote attacker with write access to PI ProcessBook files could inject code that is imported into OSIsoft PI Vision 2020 versions prior to 3.5.0. Unauthorized information disclosure, modification, or deletion is also possible if a victim views or interacts with the infected display. This vulnerability affects PI System data and other data accessible with victim’s user permissions.
Fixes

Solution

OSIsoft released PI Vision 2020 Version 3.5.0, which resolves these vulnerabilities. Recommended defensive measures and related configuration settings are described on the OSIsoft customer portal (Login required).


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:55:26.780Z

Reserved: 2020-09-04T00:00:00.000Z

Link: CVE-2020-25163

cve-icon Vulnrichment

Updated: 2024-08-04T15:26:09.485Z

cve-icon NVD

Status : Modified

Published: 2022-04-18T17:15:12.230

Modified: 2024-11-21T05:17:31.017

Link: CVE-2020-25163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.