AVEVA Historian Web Server
This vulnerability in AVEVA Historian allows an authenticated user to execute arbitrary SQL queries against the Historian database through the REST API interface. The flaw is triggered when users click on malicious URLs shared via email or other channels. Successful exploitation grants read and write access to the entire Historian database, potentially allowing an attacker to view, modify, or delete operational history, alarm records, and event logs. The issue affects Historian Server versions 2020 R2 through 2023 R2.
- Valid Historian user credentials
- Network access to the Historian REST API endpoint
- Knowledge of Historian database schema or ability to discover it
- User must click a malicious link or visit a crafted URL shared via social engineering
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6d676e53-29d6-4ee1-9bac-6c28599d7fcaGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.