AVEVA Application Server IDE
AVEVA Application Server IDE versions up to 2023 R2 SP1 P02 contain a cross-site scripting (XSS) vulnerability that allows a high-privilege local attacker to inject malicious code into help files. When users access the compromised help documentation, the injected code executes in their context, potentially enabling unauthorized actions or credential theft. The vulnerability requires high privilege access and local system interaction from the targeted user, limiting but not eliminating the risk in environments where engineering workstations are not properly secured.
- High privilege user account (administrator or equivalent)
- Local access to the Application Server IDE system
- Ability to modify help files on the server
- User interaction required (victim must open affected help files)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5a7ca80a-12cb-4653-af22-6350518fe2afGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.