AVEVA Edge products (formerly known as InduSoft Web Studio)
AVEVA Edge versions 2020 R2 SP2 and earlier contain an unsafe DLL loading vulnerability (CWE-427) that allows an attacker with local access to achieve arbitrary code execution and privilege escalation by tricking the application into loading a malicious DLL. The attacker must have local access to the system and user interaction is required to trigger the vulnerability. AVEVA recommends upgrading to AVEVA Edge 2023 or applying patch AVEVA Edge 2020 R2 SP2 P01. No public exploitation of this vulnerability has been reported.
- Local access to the AVEVA Edge workstation
- Valid user account logged into AVEVA Edge
- User interaction required (tricking the user to load a file or navigate to attacker-controlled directory)
- Vulnerable version running (AVEVA Edge 2020 R2 SP2 or earlier)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fb039e8d-77f2-45d8-a15f-062469c4f8dfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.