Description
Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.
Published: 2022-05-26
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Matrikon advises affected users to apply mitigations from its security best practices document (login required).

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-24594 Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.
History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Honeywell Matrikon Opc Server
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:17:57.516Z

Reserved: 2022-04-06T00:00:00.000Z

Link: CVE-2022-1261

cve-icon Vulnrichment

Updated: 2024-08-02T23:55:24.575Z

cve-icon NVD

Status : Modified

Published: 2022-05-26T17:15:08.767

Modified: 2024-11-21T06:40:21.780

Link: CVE-2022-1261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses