An authenticated user might execute malicious code under the user context and take control of the system. S+ Operations or S+ Historian database is affected by multiple vulnerabilities such as the possibility to allow remote authenticated users to gain high privileges.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Symphony_+_historian | Abb | 3.0 (including) | 3.0 (including) |
Symphony_+_historian | Abb | 3.1 (including) | 3.1 (including) |
Symphony_+_operations | Abb | 1.1 (including) | 1.1 (including) |
Symphony_+_operations | Abb | 2.0 (including) | 2.0 (including) |
Symphony_+_operations | Abb | 2.1-sp1 (including) | 2.1-sp1 (including) |
Symphony_+_operations | Abb | 2.1-sp2 (including) | 2.1-sp2 (including) |
Symphony_+_operations | Abb | 3.0 (including) | 3.0 (including) |
Symphony_+_operations | Abb | 3.1 (including) | 3.1 (including) |
Symphony_+_operations | Abb | 3.2 (including) | 3.2 (including) |
Symphony_+_operations | Abb | 3.3 (including) | 3.3 (including) |