Risk | High |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2021-32959 CVE-2021-32979 CVE-2021-32971 CVE-2021-32987 CVE-2021-32999 |
CWE-ID | CWE-122 CWE-476 CWE-755 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
AVEVA System Platform Server applications / SCADA systems AVEVA InTouch Server applications / Other server solutions AVEVA Historian Server applications / Other server solutions AVEVA Communication Drivers Pack Server applications / Other server solutions AVEVA Operations Integration Core Server applications / Other server solutions AVEVA Data Acquisition Servers Server applications / Other server solutions AVEVA Batch Management Server applications / Other server solutions AVEVA MES Server applications / Other server solutions AVEVA SuiteLink Server Server applications / Other server solutions |
Vendor | AVEVA Software, LLC. |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU55997
Risk: High
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32959
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in SuiteLink server while processing commands 0x05/0x06. A remote attacker can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAVEVA System Platform: 2020 R2 P01
AVEVA InTouch: 2020 R2 P01
AVEVA Historian: 2020 R2 P01
AVEVA Communication Drivers Pack: 2020 R2
AVEVA Operations Integration Core: 3.0
AVEVA Data Acquisition Servers: All versions
AVEVA Batch Management: 2020
AVEVA MES: 2014 R2
AVEVA SuiteLink Server: before 3.2.002
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-231-01
http://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AV...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55999
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32979
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in SuiteLink server while processing commands 0x04/0x0a. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAVEVA System Platform: 2020 R2 P01
AVEVA InTouch: 2020 R2 P01
AVEVA Historian: 2020 R2 P01
AVEVA Communication Drivers Pack: 2020 R2
AVEVA Operations Integration Core: 3.0
AVEVA Data Acquisition Servers: All versions
AVEVA Batch Management: 2020
AVEVA MES: 2014 R2
AVEVA SuiteLink Server: before 3.2.002
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-231-01
http://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AV...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56001
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32971
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in SuiteLink server while processing command 0x07. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAVEVA System Platform: 2020 R2 P01
AVEVA InTouch: 2020 R2 P01
AVEVA Historian: 2020 R2 P01
AVEVA Communication Drivers Pack: 2020 R2
AVEVA Operations Integration Core: 3.0
AVEVA Data Acquisition Servers: All versions
AVEVA Batch Management: 2020
AVEVA MES: 2014 R2
AVEVA SuiteLink Server: before 3.2.002
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-231-01
http://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AV...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56002
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32987
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in SuiteLink server while processing command 0x0b. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAVEVA System Platform: 2020 R2 P01
AVEVA InTouch: 2020 R2 P01
AVEVA Historian: 2020 R2 P01
AVEVA Communication Drivers Pack: 2020 R2
AVEVA Operations Integration Core: 3.0
AVEVA Data Acquisition Servers: All versions
AVEVA Batch Management: 2020
AVEVA MES: 2014 R2
AVEVA SuiteLink Server: before 3.2.002
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-231-01
http://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AV...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56003
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32999
CWE-ID:
CWE-755 - Improper Handling of Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper handling of exceptional conditions in SuiteLink server while processing command 0x01. A remote attacker can cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAVEVA System Platform: 2020 R2 P01
AVEVA InTouch: 2020 R2 P01
AVEVA Historian: 2020 R2 P01
AVEVA Communication Drivers Pack: 2020 R2
AVEVA Operations Integration Core: 3.0
AVEVA Data Acquisition Servers: All versions
AVEVA Batch Management: 2020
AVEVA MES: 2014 R2
AVEVA SuiteLink Server: before 3.2.002
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-231-01
http://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AV...
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.