This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.
Solution:
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-318-01 | third party advisory us government resource |
https://www.aveva.com/en/support-and-success/cyber-security-updates/ | vendor advisory |