Lucene search

K
zdiChris Anastasio (muffin) and Steven Seeley (mr_me) of Incite TeamZDI-22-1124
HistoryAug 23, 2022 - 12:00 a.m.

(Pwn2Own) AVEVA Edge SetBytesToManagedControl Deserialization of Untrusted Data Remote Code Execution Vulnerability

2022-08-2300:00:00
Chris Anastasio (muffin) and Steven Seeley (mr_me) of Incite Team
www.zerodayinitiative.com
22
remote code execution
aveva edge
user interaction
malicious file
untrusted data
app files

EPSS

0.001

Percentile

46.7%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of APP files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process.

EPSS

0.001

Percentile

46.7%

Related for ZDI-22-1124