AVEVA Edge 2020 R2 SP1 and all prior versions
AVEVA Edge versions 2020 R2 SP1 and all prior versions contain multiple vulnerabilities (CWE-357, CWE-427, CWE-502, CWE-611) that could allow arbitrary code execution, information disclosure, or denial of service when a user opens a malicious project file. The vulnerabilities are exploitable only with local access and require user interaction to trigger. Successful exploitation could result in unauthorized modification of control system projects, access to sensitive configuration data, or system crashes that disrupt operations.
- Local access to a machine with AVEVA Edge installed
- User interaction required—victim must open a malicious project file
- No special privileges or credentials required to trigger exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1143a18e-5e38-4d75-830e-84763271748bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.