Lucene search

K
cvelistIcscertCVELIST:CVE-2022-1261
HistoryMay 24, 2022 - 12:00 a.m.

CVE-2022-1261 Matrikon OPC Server Improper Access Control

2022-05-2400:00:00
CWE-284
icscert
www.cve.org

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.9%

Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.

CNA Affected

[
  {
    "product": "Matrikon OPC Server",
    "vendor": "Matrikon, a subsidiary of Honeywell",
    "versions": [
      {
        "status": "affected",
        "version": "All Versions"
      }
    ]
  }
]

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.9%

Related for CVELIST:CVE-2022-1261