Description
Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.
No analysis available yet.
Remediation
Vendor Solution
Matrikon advises affected users to apply mitigations from its security best practices document (login required).
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24594 | Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges. |
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-144-02 |
|
History
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:17:57.516Z
Reserved: 2022-04-06T00:00:00.000Z
Link: CVE-2022-1261
Updated: 2024-08-02T23:55:24.575Z
Status : Modified
Published: 2022-05-26T17:15:08.767
Modified: 2024-11-21T06:40:21.780
Link: CVE-2022-1261
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD