CVE Vulnerabilities

CVE-2023-33873

Execution with Unnecessary Privileges

Published: Nov 15, 2023 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.

Weakness

The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.

Affected Software

Name Vendor Start Version End Version
Batch_management Aveva * 2020 (excluding)
Batch_management Aveva 2020 (including) 2020 (including)
Batch_management Aveva 2020-sp1 (including) 2020-sp1 (including)
Communication_drivers Aveva * 2020 (excluding)
Communication_drivers Aveva 2020 (including) 2020 (including)
Communication_drivers Aveva 2020-r2 (including) 2020-r2 (including)
Communication_drivers Aveva 2020-r2_p01 (including) 2020-r2_p01 (including)
Edge Aveva * 20.1.101 (including)
Enterprise_licensing Aveva * 3.7.002 (including)
Historian Aveva * 2020 (excluding)
Historian Aveva 2020 (including) 2020 (including)
Historian Aveva 2020-r2 (including) 2020-r2 (including)
Historian Aveva 2020-r2_p01 (including) 2020-r2_p01 (including)
Intouch Aveva * 2020 (excluding)
Intouch Aveva 2020 (including) 2020 (including)
Intouch Aveva 2020-r2 (including) 2020-r2 (including)
Intouch Aveva 2020-r2_p01 (including) 2020-r2_p01 (including)
Manufacturing_execution_system Aveva * 2020 (excluding)
Manufacturing_execution_system Aveva 2020 (including) 2020 (including)
Manufacturing_execution_system Aveva 2020-p01 (including) 2020-p01 (including)
Mobile_operator Aveva * 2020 (excluding)
Mobile_operator Aveva 2020 (including) 2020 (including)
Mobile_operator Aveva 2020-r1 (including) 2020-r1 (including)
Plant_scada Aveva * 2020 (excluding)
Plant_scada Aveva 2020 (including) 2020 (including)
Plant_scada Aveva 2020-r2 (including) 2020-r2 (including)
Recipe_management Aveva * 2020 (excluding)
Recipe_management Aveva 2020 (including) 2020 (including)
Recipe_management Aveva 2020-update_1_patch_2 (including) 2020-update_1_patch_2 (including)
System_platform Aveva * 2020 (excluding)
System_platform Aveva 2020 (including) 2020 (including)
System_platform Aveva 2020-r2 (including) 2020-r2 (including)
System_platform Aveva 2020-r2_p01 (including) 2020-r2_p01 (including)
Telemetry_server Aveva 2020r2 (including) 2020r2 (including)
Telemetry_server Aveva 2020r2-sp1 (including) 2020r2-sp1 (including)
Work_tasks Aveva * 2020 (excluding)
Work_tasks Aveva 2020 (including) 2020 (including)
Work_tasks Aveva 2020-update_1 (including) 2020-update_1 (including)
Work_tasks Aveva 2020-update_2 (including) 2020-update_2 (including)

Extended Description

New weaknesses can be exposed because running with extra privileges, such as root or Administrator, can disable the normal security checks being performed by the operating system or surrounding environment. Other pre-existing weaknesses can turn into security vulnerabilities if they occur while operating at raised privileges. Privilege management functions can behave in some less-than-obvious ways, and they have different quirks on different platforms. These inconsistencies are particularly pronounced if you are transitioning from one non-root user to another. Signal handlers and spawned processes run at the privilege of the owning process, so if a process is running as root when a signal fires or a sub-process is executed, the signal handler or sub-process will operate with root privileges.

Potential Mitigations

References