In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.
During installation, installed file permissions are set to allow anyone to modify those files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pi_api | Osisoft | * | 1.6.8.26 (including) |
Pi_api | Osisoft | * | 2.0.2.5 (including) |
Pi_buffer_subsystem | Osisoft | * | 4.8.0.18 (including) |
Pi_connector | Osisoft | * | 1.0.0.54 (including) |
Pi_connector | Osisoft | * | 1.1.0.10 (including) |
Pi_connector | Osisoft | * | 1.2.0.6 (including) |
Pi_connector | Osisoft | * | 1.2.0.42 (including) |
Pi_connector | Osisoft | * | 1.2.1.71 (including) |
Pi_connector | Osisoft | * | 1.2.2.79 (including) |
Pi_connector | Osisoft | * | 1.3.0.1 (including) |
Pi_connector | Osisoft | * | 1.3.0.130 (including) |
Pi_connector | Osisoft | * | 1.3.1.135 (including) |
Pi_connector | Osisoft | * | 1.4.0.17 (including) |
Pi_connector | Osisoft | * | 1.5.0.88 (including) |
Pi_connector_relay | Osisoft | * | 2.5.19.0 (including) |
Pi_data_archive | Osisoft | * | 3.4.430.460 (including) |
Pi_data_collection_manager | Osisoft | * | 2.5.19.0 (including) |
Pi_integrator | Osisoft | * | 2.2.0.183 (including) |
Pi_interface_configuration_utility | Osisoft | * | 1.5.0.7 (including) |
Pi_to_ocs | Osisoft | * | 1.1.36.0 (including) |