AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere
AVEVA InTouch Access Anywhere (version 2023 and earlier) and Plant SCADA Access Anywhere (version 2020 R2 and earlier) contain a critical vulnerability that allows unauthenticated network attackers to execute arbitrary code on affected servers. The vulnerability is caused by improper input validation in the web interface (CWE-23, CWE-120) and may enable cross-site scripting attacks (CWE-79). No vendor patches are currently available for either product. The vulnerability has a 92.2% exploit probability (EPSS) and has been observed in targeted attacks.
- Network access to the InTouch or Plant SCADA Access Anywhere web service (typically port 443 or similar HTTPS port)
- No valid credentials required
- The vulnerable product must be Internet-facing or accessible from an attacker's network position
Patching may require device reboot — plan for process interruption
/api/v1/advisories/46c0aa6f-e48a-4096-9fc5-60cc7cf4c0fcGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.