Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24594 Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.
Fixes

Solution

Matrikon advises affected users to apply mitigations from its security best practices document (login required).


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:17:57.516Z

Reserved: 2022-04-06T00:00:00.000Z

Link: CVE-2022-1261

cve-icon Vulnrichment

Updated: 2024-08-02T23:55:24.575Z

cve-icon NVD

Status : Modified

Published: 2022-05-26T17:15:08.767

Modified: 2024-11-21T06:40:21.780

Link: CVE-2022-1261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.