Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32053 | There is a vulnerability in AVEVA PI Asset Framework Client that could allow malicious code to execute on the PI System Explorer environment under the privileges of an interactive user that was socially engineered to import XML supplied by an attacker. |
Solution
AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible: * (Recommended) All affected versions can be fixed by upgrading to PI AF Client 2023 Patch 1 or later: From OSI Soft Customer Portal https://my.osisoft.com/ , search for "Asset Framework" and select "PI Asset Framework (AF) Client 2023 Patch 1" or later. * (Alternative) AF Client 2018 SP3 P04 and prior can be fixed by deploying PI AF Client 2018 SP3 Patch 5 or later: From OSI Soft Customer Portal https://my.osisoft.com/ , search for "Asset Framework" and select either "PI Asset Framework (AF) Client 2018 SP3 Patch 5" or later. AVEVA further recommends users follow general defensive measures: * Run PI System Explorer as a least privilege interactive account when possible. * Establish procedures for verifying the source of XML is trusted before importing into PI System Explorer. For additional information please refer to AVEVA-2024-004 https://www.aveva.com/en/support-and-success/cyber-security-updates/
Workaround
No workaround given by the vendor.
Thu, 03 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aveva
Aveva pi Asset Framework Client |
|
| CPEs | cpe:2.3:a:aveva:pi_asset_framework_client:2018:sp3_patch_4:*:*:*:*:*:* cpe:2.3:a:aveva:pi_asset_framework_client:2023:*:*:*:*:*:*:* |
|
| Vendors & Products |
Aveva
Aveva pi Asset Framework Client |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-01T20:12:07.612Z
Reserved: 2024-04-08T15:55:44.665Z
Link: CVE-2024-3467
Updated: 2024-08-01T20:12:07.612Z
Status : Modified
Published: 2024-06-12T21:15:50.617
Modified: 2024-11-21T09:29:39.743
Link: CVE-2024-3467
No data.
OpenCVE Enrichment
No data.
EUVD