AVEVA InTouch Access Anywhere
InTouch Access Anywhere versions 2017 Update 2 and earlier are vulnerable to stored or reflected cross-site scripting (XSS) attacks via CWE-79. Successful exploitation allows attackers to inject and execute arbitrary JavaScript or HTML code in a user's browser session, enabling theft of sensitive information such as credentials or process data, and potentially allowing unauthorized commands to be executed on connected control systems. The vulnerability is triggered by user interaction (clicking a malicious link) but requires no special authentication from the attacker's side.
- User must click a malicious link or visit an attacker-controlled webpage while an authenticated InTouch Access Anywhere session is active
- No special network access required; attack is web-based and works over the internet
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c61020cf-cb15-446e-a96c-8a6112c0f898Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.