Aveva Edge vulnerabilities
14 known vulnerabilities affecting aveva/edge.
Total CVEs
14
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH10MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2025-9317HIGHCVSS 8.3≤ Versions 2023 R22025-11-15
CVE-2025-9317 [HIGH] CWE-327 CVE-2025-9317: The vulnerability, if exploited, could allow a miscreant with read
access to Edge Project files or
The vulnerability, if exploited, could allow a miscreant with read
access to Edge Project files or Edge Offline Cache files to reverse
engineer Edge users' app-native or Active Directory passwords through
computational brute-forcing of weak hashes.
cvelistv5nvd
CVE-2021-42796CRITICALCVSS 9.8fixed in 2020v20202023-12-16
CVE-2021-42796 [CRITICAL] CWE-78 CVE-2021-42796: An issue was discovered in ExecuteCommand() in AVEVA Edge (formerly InduSoft Web Studio) versions R2
An issue was discovered in ExecuteCommand() in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior that allows unauthenticated arbitrary commands to be executed.
nvd
CVE-2021-42797HIGHCVSS 7.5fixed in 2020v20202023-12-16
CVE-2021-42797 [HIGH] CWE-22 CVE-2021-42797: Path traversal vulnerability in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior a
Path traversal vulnerability in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior allows an unauthenticated user to steal the Windows access token of the user account configured for accessing external DB resources.
nvd
CVE-2021-42794MEDIUMCVSS 5.3fixed in 2020v20202023-12-16
CVE-2021-42794 [MEDIUM] CVE-2021-42794: An issue was discovered in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior. The a
An issue was discovered in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior. The application allows a client to provide a malicious connection string that could allow an adversary to port scan the LAN, depending on the hosts' responses.
nvd
CVE-2023-33873HIGHCVSS 7.8≤ 20.1.1012023-11-15
CVE-2023-33873 [HIGH] CWE-250 CVE-2023-33873:
This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user wi
This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.
cvelistv5nvd
CVE-2023-34982HIGHCVSS 7.1≤ 20.1.1012023-11-15
CVE-2023-34982 [HIGH] CWE-73 CVE-2023-34982:
This external control vulnerability, if exploited, could allow a local OS-authenticated user with s
This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.
cvelistv5nvd
CVE-2022-36969HIGHCVSS 7.1v2020 SP2 Patch 0(4201.2111.1802.0000)2023-03-29
CVE-2022-36969 [HIGH] CWE-611 CVE-2022-36969: This vulnerability allows remote attackers to disclose sensitive information on affected installatio
This vulnerability allows remote attackers to disclose sensitive information on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the LoadImportedLibraries method.
cvelistv5nvd
CVE-2022-28688HIGHCVSS 7.8v2020 SP2 Patch 0(4201.2111.1802.0000)2023-03-29
CVE-2022-28688 [HIGH] CWE-427 CVE-2022-28688: This vulnerability allows remote attackers to execute arbitrary code on affected installations of AV
This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process lo
cvelistv5nvd
CVE-2022-28686HIGHCVSS 7.8v2020 SP2 Patch 0(4201.2111.1802.0000)2023-03-29
CVE-2022-28686 [HIGH] CWE-427 CVE-2022-28686: This vulnerability allows remote attackers to execute arbitrary code on affected installations of AV
This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process lo
cvelistv5nvd
CVE-2022-36970HIGHCVSS 7.8v20.0 Build: 4201.2111.1802.0000 Service Pack 22023-03-29
CVE-2022-36970 [HIGH] CWE-356 CVE-2022-36970: This vulnerability allows remote attackers to execute arbitrary code on affected installations of AV
This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 20.0 Build: 4201.2111.1802.0000 Service Pack 2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of APP files. Cra
cvelistv5nvd
CVE-2022-28687HIGHCVSS 7.8v2020 SP2 Patch 0(4201.2111.1802.0000)2023-03-29
CVE-2022-28687 [HIGH] CWE-427 CVE-2022-28687: This vulnerability allows remote attackers to execute arbitrary code on affected installations of AV
This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process lo
cvelistv5nvd
CVE-2022-28685HIGHCVSS 7.8v2020 SP2 Patch 0(4201.2111.1802.0000)2023-03-29
CVE-2022-28685 [HIGH] CWE-502 CVE-2022-28685: This vulnerability allows remote attackers to execute arbitrary code on affected installations of AV
This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of APP files. The issue resul
cvelistv5nvd
CVE-2018-17914CRITICALCVSS 9.8v8.12018-11-02
CVE-2018-17914 [CRITICAL] CWE-258 CVE-2018-17914: InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Editio
InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2. This vulnerability could allow an unauthenticated user to remotely execute code with the same privileges as that of the InduSoft Web Studio or InTouch Edge HMI (formerly InTouch Machine Edition) runtime.
nvd
CVE-2018-17916CRITICALCVSS 9.8v8.12018-11-02
CVE-2018-17916 [CRITICAL] CWE-121 CVE-2018-17916: InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Editio
InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2. A remote attacker could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code to be executed.
nvd