CVE ID | CVE-2022-2897 |
CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
Measuresoft |
AFFECTED PRODUCTS |
ScadaPro Client |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of Measuresoft ScadaPro Client. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the ScadaPro Client installer. By creating a symbolic link, an attacker can abuse the installer to overwrite a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. |
ADDITIONAL DETAILS |
Measuresoft has issued an update to correct this vulnerability. More details can be found at:
https://www.cisa.gov/uscert/ics/advisories/icsa-22-235-06 |
DISCLOSURE TIMELINE |
|
CREDIT | Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative |