CVE-2023-34982

AVEVA Operations Control Logger External Control of File Name or Path

Description

This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.

Remediation

Solution:

  • AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users of affected products should apply security updates as soon as possible. In addition to applying security updates, users should follow these general precautions: * Ensure that Guest or Anonymous local OS accounts are disabled. * Ensure that only trusted users are able to login on the nodes where the Operations Control Logger is running. Please see AVEVA Security Bulletin number AVEVA-2023-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/  for more information and for links for individual security updates and mitigations for each of the affected products. AVEVA System Platform 2020 through 2020 R2 SP1 cannot be newly installed on top of other AVEVA products which have been previously patched with the Operations Control Logger v22.1. For additional details please refer to Alert 000038736. https://softwaresupportsp.aveva.com/#/knowledgebase/details/000038736

Categories

5.5
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.09%
Vendor Advisory aveva.com
Affected: AVEVA SystemPlatform
Affected: AVEVA Historian
Affected: AVEVA Application Server
Affected: AVEVA InTouch
Affected: AVEVA Enterprise Licensing (formerly known as License Manager)
Affected: AVEVA Manufacturing Execution System (formerly known as Wonderware MES)
Affected: AVEVA Recipe Management
Affected: AVEVA Batch Management
Affected: AVEVA Edge (formerly known as Indusoft Web Studio)
Affected: AVEVA Worktasks (formerly known as Workflow Management)
Affected: AVEVA Plant SCADA (formerly known as Citect)
Affected: AVEVA Mobile Operator (formerly known as IntelaTrac Mobile Operator Rounds)
Affected: AVEVA Communication Drivers Pack
Affected: AVEVA Telemetry Server
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-34982?
CVE-2023-34982 has been scored as a medium severity vulnerability.
How to fix CVE-2023-34982?
To fix CVE-2023-34982: AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users of affected products should apply security updates as soon as possible. In addition to applying security updates, users should follow these general precautions: * Ensure that Guest or Anonymous local OS accounts are disabled. * Ensure that only trusted users are able to login on the nodes where the Operations Control Logger is running. Please see AVEVA Security Bulletin number AVEVA-2023-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/  for more information and for links for individual security updates and mitigations for each of the affected products. AVEVA System Platform 2020 through 2020 R2 SP1 cannot be newly installed on top of other AVEVA products which have been previously patched with the Operations Control Logger v22.1. For additional details please refer to Alert 000038736. https://softwaresupportsp.aveva.com/#/knowledgebase/details/000038736
Is CVE-2023-34982 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-34982 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-34982?
CVE-2023-34982 affects AVEVA SystemPlatform, AVEVA Historian, AVEVA Application Server, AVEVA InTouch, AVEVA Enterprise Licensing (formerly known as License Manager), AVEVA Manufacturing Execution System (formerly known as Wonderware MES), AVEVA Recipe Management, AVEVA Batch Management, AVEVA Edge (formerly known as Indusoft Web Studio), AVEVA Worktasks (formerly known as Workflow Management), AVEVA Plant SCADA (formerly known as Citect), AVEVA Mobile Operator (formerly known as IntelaTrac Mobile Operator Rounds), AVEVA Communication Drivers Pack, AVEVA Telemetry Server.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.