Search criteria

8 vulnerabilities found for PI Server by Aveva

CVE-2025-36539 (GCVE-0-2025-36539)

Vulnerability from cvelistv5 – Published: 2025-06-12 19:56 – Updated: 2025-06-12 20:04
VLAI?
Title
AVEVA PI Data Archive Uncaught Exception
Summary
AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service.
CWE
Assigner
Impacted products
Vendor Product Version
AVEVA PI Data Archive Affected: 2023 , ≤ 2018 SP3 Patch 4 (custom)
Create a notification for this product.
    AVEVA PI Data Archive Affected: 2023 Patch 1
Create a notification for this product.
    AVEVA PI Server Affected: 2023 , ≤ 2018 SP3 Patch 6 (custom)
Create a notification for this product.
    AVEVA PI Server Affected: 2023 Patch 1 , ≤ 2018 SP3 Patch 6 (custom)
Create a notification for this product.
Credits
AVEVA reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36539",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-12T20:04:09.170573Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-12T20:04:23.575Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 4",
              "status": "affected",
              "version": "2023",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023 Patch 1"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 6",
              "status": "affected",
              "version": "2023",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 6",
              "status": "affected",
              "version": "2023 Patch 1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "AVEVA reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AVEVA PI Data Archive products \nare vulnerable to an uncaught exception that, if exploited, could allow \nan authenticated user to shut down certain necessary PI Data Archive \nsubsystems, resulting in a denial of service."
            }
          ],
          "value": "AVEVA PI Data Archive products \nare vulnerable to an uncaught exception that, if exploited, could allow \nan authenticated user to shut down certain necessary PI Data Archive \nsubsystems, resulting in a denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-248",
              "description": "CWE-248",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-12T19:56:33.320Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-07"
        },
        {
          "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u003c/p\u003e\u003cp\u003eAll affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSISoft Customer Portal\u003c/a\u003e, search for \"AVEVA PI Server\" and select version 2024 or higher.\u003c/p\u003e\u003cp\u003eFor additional information please refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\"\u003eAVEVA-2025-001\u003c/a\u003e.\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\n\nAll affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From  OSISoft Customer Portal https://my.osisoft.com/ , search for \"AVEVA PI Server\" and select version 2024 or higher.\n\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ ."
        }
      ],
      "source": {
        "advisory": "ICSA-25-162-07",
        "discovery": "INTERNAL"
      },
      "title": "AVEVA PI Data Archive Uncaught Exception",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u003c/p\u003e\u003cp\u003eAVEVA further recommends users follow general defensive measures:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eMonitor liveness of PI Network Manager and PI Archive Subsystem services.\u003c/li\u003e\n\u003cli\u003eSet the PI Network Manager and PI Archive Subsystem services to automatically restart.\u003c/li\u003e\n\u003cli\u003eLimit Port 5450 access to trusted workstations and software.\u003c/li\u003e\n\u003cli\u003eFor a list of PI System firewall port requirements, see knowledge base article \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB01162\"\u003eKB01162 - Firewall Port Requirements\u003c/a\u003e.\u003c/li\u003e\u003c/ul\u003e\u003cli\u003eImpact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization\u0027s architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.\u003c/li\u003e\u003cli\u003eFor a starting point on PI System security best practices, see knowledge base article \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB00833\"\u003eKB00833 - Seven best practices for securing your PI Server\u003c/a\u003e.\u003c/li\u003e\u003cp\u003eFor additional information please refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\"\u003eAVEVA-2025-001\u003c/a\u003e.\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\n\nAVEVA further recommends users follow general defensive measures:\n\n\n\n  *  Monitor liveness of PI Network Manager and PI Archive Subsystem services.\n\n  *  Set the PI Network Manager and PI Archive Subsystem services to automatically restart.\n\n  *  Limit Port 5450 access to trusted workstations and software.\n\n  *  For a list of PI System firewall port requirements, see knowledge base article  KB01162 - Firewall Port Requirements https://customers.osisoft.com/s/knowledgearticle .\n\n\n  *  Impact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization\u0027s architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.\n  *  For a starting point on PI System security best practices, see knowledge base article  KB00833 - Seven best practices for securing your PI Server https://customers.osisoft.com/s/knowledgearticle .\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ ."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2025-36539",
    "datePublished": "2025-06-12T19:56:33.320Z",
    "dateReserved": "2025-04-21T19:39:54.984Z",
    "dateUpdated": "2025-06-12T20:04:23.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-44019 (GCVE-0-2025-44019)

Vulnerability from cvelistv5 – Published: 2025-06-12 19:51 – Updated: 2025-06-12 20:06
VLAI?
Title
AVEVA PI Data Archive Uncaught Exception
Summary
AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service. Depending on the timing of the crash, data present in snapshots/write cache may be lost.
CWE
Assigner
Impacted products
Credits
AVEVA reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-44019",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-12T20:06:34.741269Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-12T20:06:50.361Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 4",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023 Patch 1"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 6",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023 Patch 1"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "AVEVA reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if \nexploited, could allow an authenticated user to shut down certain \nnecessary PI Data Archive subsystems, resulting in a denial of service. \nDepending on the timing of the crash, data present in snapshots/write \ncache may be lost."
            }
          ],
          "value": "AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if \nexploited, could allow an authenticated user to shut down certain \nnecessary PI Data Archive subsystems, resulting in a denial of service. \nDepending on the timing of the crash, data present in snapshots/write \ncache may be lost."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-248",
              "description": "CWE-248",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-12T19:59:08.542Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-07"
        },
        {
          "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
        },
        {
          "url": "https://my.osisoft.com/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u003c/p\u003e\u003cp\u003eAll affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSISoft Customer Portal\u003c/a\u003e, search for \"AVEVA PI Server\" and select version 2024 or higher.\u003c/p\u003e\u003cp\u003ePI Data Archive 2018 SP3 Patch 4 and all prior and \nPI Server 2018 SP3 Patch 6 and all prior can alternatively be fixed by \nupgrading to PI Server 2018 SP3 Patch 7 or higher. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSISoft Customer Portal\u003c/a\u003e, search for \"AVEVA PI Server\" and select Version 2018 SP3 Patch 7 or higher.\u003c/p\u003e\u003cp\u003eFor additional information please refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\"\u003eAVEVA-2025-001\u003c/a\u003e.\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\n\nAll affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From  OSISoft Customer Portal https://my.osisoft.com/ , search for \"AVEVA PI Server\" and select version 2024 or higher.\n\nPI Data Archive 2018 SP3 Patch 4 and all prior and \nPI Server 2018 SP3 Patch 6 and all prior can alternatively be fixed by \nupgrading to PI Server 2018 SP3 Patch 7 or higher. From  OSISoft Customer Portal https://my.osisoft.com/ , search for \"AVEVA PI Server\" and select Version 2018 SP3 Patch 7 or higher.\n\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ ."
        }
      ],
      "source": {
        "advisory": "ICSA-25-162-07",
        "discovery": "INTERNAL"
      },
      "title": "AVEVA PI Data Archive Uncaught Exception",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u0026nbsp;\u003c/p\u003e\u003cp\u003eAVEVA further recommends users follow general defensive measures:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eMonitor liveness of PI Network Manager and PI Archive Subsystem services.\u003c/li\u003e\n\u003cli\u003eSet the PI Network Manager and PI Archive Subsystem services to automatically restart.\u003c/li\u003e\n\u003cli\u003eLimit Port 5450 access to trusted workstations and software.\u003c/li\u003e\n\u003cli\u003eFor a list of PI System firewall port requirements, see knowledge base article \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB01162\"\u003eKB01162 - Firewall Port Requirements\u003c/a\u003e.\u003c/li\u003e\u003c/ul\u003e\u003cli\u003eImpact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization\u0027s architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.\u003c/li\u003e\n\u003cli\u003eFor a starting point on PI System security best practices, see knowledge base article \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB00833\"\u003eKB00833 - Seven best practices for securing your PI Server\u003c/a\u003e.\n\u003cp\u003e\u003c/p\u003e\u003cp\u003eFor additional information please refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\"\u003eAVEVA-2025-001\u003c/a\u003e.\n\n\u003c/p\u003e\n\n\u003c/li\u003e\u003cli\u003e\u003cbr\u003e\u003c/li\u003e"
            }
          ],
          "value": "AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u00a0\n\nAVEVA further recommends users follow general defensive measures:\n\n\n\n  *  Monitor liveness of PI Network Manager and PI Archive Subsystem services.\n\n  *  Set the PI Network Manager and PI Archive Subsystem services to automatically restart.\n\n  *  Limit Port 5450 access to trusted workstations and software.\n\n  *  For a list of PI System firewall port requirements, see knowledge base article  KB01162 - Firewall Port Requirements https://customers.osisoft.com/s/knowledgearticle .\n\n\n  *  Impact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization\u0027s architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.\n\n  *  For a starting point on PI System security best practices, see knowledge base article  KB00833 - Seven best practices for securing your PI Server https://customers.osisoft.com/s/knowledgearticle .\n\n\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .\n\n\n\n\n\n\n  *"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2025-44019",
    "datePublished": "2025-06-12T19:51:56.663Z",
    "dateReserved": "2025-04-21T19:39:54.994Z",
    "dateUpdated": "2025-06-12T20:06:50.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34348 (GCVE-0-2023-34348)

Vulnerability from cvelistv5 – Published: 2024-01-18 17:16 – Updated: 2024-10-21 11:44
VLAI?
Title
Improper Check or Handling of Exceptional Conditions in Aveva PI Server
Summary
AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.
CWE
  • CWE-703 - Improper Check or Handling of Exceptional Conditions
Assigner
References
Impacted products
Vendor Product Version
Aveva PI Server Affected: 2023
Affected: 0 , ≤ 2018 SP3 P05 (custom)
Create a notification for this product.
Credits
Aveva
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:10:06.138Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "government-resource",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34348",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-23T05:01:34.023375Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-754",
                "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T11:44:39.250Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "Aveva",
          "versions": [
            {
              "status": "affected",
              "version": "2023"
            },
            {
              "lessThanOrEqual": "2018 SP3 P05 ",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Aveva"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eAVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.\u003c/p\u003e\u003cbr\u003e\n\n"
            }
          ],
          "value": "\nAVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.\n\n\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-703",
              "description": "CWE-703: Improper Check or Handling of Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-18T17:16:50.038Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "government-resource"
          ],
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eAll affected versions can be fixed by upgrading to AVEVA PI Server version 2023 Patch 1 or later. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSI Soft Customer Portal\u003c/a\u003e, search for \u201cPI Server\u201d and select version \u201c2023 Patch 1\u201d.\u003c/p\u003e\u003cp\u003eFor an alternative fix, AVEVA PI Server 2018 SP3 Patch 5 and prior can be fixed by deploying AVEVA PI Server version 2018 SP3 Patch 6 or later. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSI Soft Customer Portal\u003c/a\u003e, search for \u201cPI Server\u201d and select version \u201c2018 SP3 Patch 6\u201d.\u003c/p\u003e\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible.\u003c/p\u003e\u003cp\u003eAVEVA recommends the following defensive measures:\u003c/p\u003e\u003cul\u003e\u003cli\u003eSet the PI Message Subsystem to auto restart.\u003c/li\u003e\u003cli\u003eMonitor the memory usage of the PI Message Subsystem.\u003c/li\u003e\u003cli\u003eLimit network access to port 5450 to trusted workstations and software\u003c/li\u003e\u003cli\u003eConfirm that only authorized users have access to write to the PI Server Message Log. This is done through configuration of the PIMSGSS entry within the Database Security plugin accessible through PI System Management Tools.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eFor more information on this vulnerability, including security updates, users should see security bulletin \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-001.pdf\"\u003eAVEVA-2024-001\u003c/a\u003e.\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nAll affected versions can be fixed by upgrading to AVEVA PI Server version 2023 Patch 1 or later. From  OSI Soft Customer Portal https://my.osisoft.com/ , search for \u201cPI Server\u201d and select version \u201c2023 Patch 1\u201d.\n\nFor an alternative fix, AVEVA PI Server 2018 SP3 Patch 5 and prior can be fixed by deploying AVEVA PI Server version 2018 SP3 Patch 6 or later. From  OSI Soft Customer Portal https://my.osisoft.com/ , search for \u201cPI Server\u201d and select version \u201c2018 SP3 Patch 6\u201d.\n\nAVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible.\n\nAVEVA recommends the following defensive measures:\n\n  *  Set the PI Message Subsystem to auto restart.\n  *  Monitor the memory usage of the PI Message Subsystem.\n  *  Limit network access to port 5450 to trusted workstations and software\n  *  Confirm that only authorized users have access to write to the PI Server Message Log. This is done through configuration of the PIMSGSS entry within the Database Security plugin accessible through PI System Management Tools.\n\n\nFor more information on this vulnerability, including security updates, users should see security bulletin  AVEVA-2024-001 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-001.pdf .\n\n\n\n\n"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper Check or Handling of Exceptional Conditions in Aveva PI Server ",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2023-34348",
    "datePublished": "2024-01-18T17:16:50.038Z",
    "dateReserved": "2023-07-12T18:40:13.110Z",
    "dateUpdated": "2024-10-21T11:44:39.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31274 (GCVE-0-2023-31274)

Vulnerability from cvelistv5 – Published: 2024-01-18 17:15 – Updated: 2024-08-29 20:02
VLAI?
Title
Missing Release of Resource after Effective Lifetime vulnerability in Aveva PI Server
Summary
AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to cause the PI Message Subsystem of a PI Server to consume available memory resulting in throttled processing of new PI Data Archive events and a partial denial-of-service condition.
CWE
  • CWE-772 - Missing Release of Resource after Effective Lifetime
Assigner
References
Impacted products
Vendor Product Version
Aveva PI Server Affected: 2023
Affected: 0 , ≤ 2018 SP3 P05 (custom)
Create a notification for this product.
Credits
Aveva
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:30.876Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "government-resource",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31274",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-23T05:01:33.321397Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-29T20:02:08.687Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "Aveva",
          "versions": [
            {
              "status": "affected",
              "version": "2023"
            },
            {
              "lessThanOrEqual": "2018 SP3 P05 ",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Aveva"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eAVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to cause the PI Message Subsystem of a PI Server to consume available memory resulting in throttled processing of new PI Data Archive events and a partial denial-of-service condition.\u003c/p\u003e\u003cbr\u003e\n\n"
            }
          ],
          "value": "\nAVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to cause the PI Message Subsystem of a PI Server to consume available memory resulting in throttled processing of new PI Data Archive events and a partial denial-of-service condition.\n\n\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-772",
              "description": "CWE-772 Missing Release of Resource after Effective Lifetime",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-18T17:15:25.837Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "government-resource"
          ],
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eAll affected versions can be fixed by upgrading to AVEVA PI Server version 2023 Patch 1 or later. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSI Soft Customer Portal\u003c/a\u003e, search for \u201cPI Server\u201d and select version \u201c2023 Patch 1\u201d.\u003c/p\u003e\u003cp\u003eFor an alternative fix, AVEVA PI Server 2018 SP3 Patch 5 and prior can be fixed by deploying AVEVA PI Server version 2018 SP3 Patch 6 or later. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSI Soft Customer Portal\u003c/a\u003e, search for \u201cPI Server\u201d and select version \u201c2018 SP3 Patch 6\u201d.\u003c/p\u003e\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible.\u003c/p\u003e\u003cp\u003eAVEVA recommends the following defensive measures:\u003c/p\u003e\u003cul\u003e\u003cli\u003eSet the PI Message Subsystem to auto restart.\u003c/li\u003e\u003cli\u003eMonitor the memory usage of the PI Message Subsystem.\u003c/li\u003e\u003cli\u003eLimit network access to port 5450 to trusted workstations and software\u003c/li\u003e\u003cli\u003eConfirm that only authorized users have access to write to the PI Server Message Log. This is done through configuration of the PIMSGSS entry within the Database Security plugin accessible through PI System Management Tools.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eFor more information on this vulnerability, including security updates, users should see security bulletin \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-001.pdf\"\u003eAVEVA-2024-001\u003c/a\u003e.\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nAll affected versions can be fixed by upgrading to AVEVA PI Server version 2023 Patch 1 or later. From  OSI Soft Customer Portal https://my.osisoft.com/ , search for \u201cPI Server\u201d and select version \u201c2023 Patch 1\u201d.\n\nFor an alternative fix, AVEVA PI Server 2018 SP3 Patch 5 and prior can be fixed by deploying AVEVA PI Server version 2018 SP3 Patch 6 or later. From  OSI Soft Customer Portal https://my.osisoft.com/ , search for \u201cPI Server\u201d and select version \u201c2018 SP3 Patch 6\u201d.\n\nAVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible.\n\nAVEVA recommends the following defensive measures:\n\n  *  Set the PI Message Subsystem to auto restart.\n  *  Monitor the memory usage of the PI Message Subsystem.\n  *  Limit network access to port 5450 to trusted workstations and software\n  *  Confirm that only authorized users have access to write to the PI Server Message Log. This is done through configuration of the PIMSGSS entry within the Database Security plugin accessible through PI System Management Tools.\n\n\nFor more information on this vulnerability, including security updates, users should see security bulletin  AVEVA-2024-001 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-001.pdf .\n\n\n\n\n"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Missing Release of Resource after Effective Lifetime vulnerability in Aveva PI Server ",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2023-31274",
    "datePublished": "2024-01-18T17:15:25.837Z",
    "dateReserved": "2023-07-12T18:40:13.101Z",
    "dateUpdated": "2024-08-29T20:02:08.687Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-36539 (GCVE-0-2025-36539)

Vulnerability from nvd – Published: 2025-06-12 19:56 – Updated: 2025-06-12 20:04
VLAI?
Title
AVEVA PI Data Archive Uncaught Exception
Summary
AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service.
CWE
Assigner
Impacted products
Vendor Product Version
AVEVA PI Data Archive Affected: 2023 , ≤ 2018 SP3 Patch 4 (custom)
Create a notification for this product.
    AVEVA PI Data Archive Affected: 2023 Patch 1
Create a notification for this product.
    AVEVA PI Server Affected: 2023 , ≤ 2018 SP3 Patch 6 (custom)
Create a notification for this product.
    AVEVA PI Server Affected: 2023 Patch 1 , ≤ 2018 SP3 Patch 6 (custom)
Create a notification for this product.
Credits
AVEVA reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36539",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-12T20:04:09.170573Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-12T20:04:23.575Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 4",
              "status": "affected",
              "version": "2023",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023 Patch 1"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 6",
              "status": "affected",
              "version": "2023",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 6",
              "status": "affected",
              "version": "2023 Patch 1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "AVEVA reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AVEVA PI Data Archive products \nare vulnerable to an uncaught exception that, if exploited, could allow \nan authenticated user to shut down certain necessary PI Data Archive \nsubsystems, resulting in a denial of service."
            }
          ],
          "value": "AVEVA PI Data Archive products \nare vulnerable to an uncaught exception that, if exploited, could allow \nan authenticated user to shut down certain necessary PI Data Archive \nsubsystems, resulting in a denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-248",
              "description": "CWE-248",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-12T19:56:33.320Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-07"
        },
        {
          "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u003c/p\u003e\u003cp\u003eAll affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSISoft Customer Portal\u003c/a\u003e, search for \"AVEVA PI Server\" and select version 2024 or higher.\u003c/p\u003e\u003cp\u003eFor additional information please refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\"\u003eAVEVA-2025-001\u003c/a\u003e.\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\n\nAll affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From  OSISoft Customer Portal https://my.osisoft.com/ , search for \"AVEVA PI Server\" and select version 2024 or higher.\n\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ ."
        }
      ],
      "source": {
        "advisory": "ICSA-25-162-07",
        "discovery": "INTERNAL"
      },
      "title": "AVEVA PI Data Archive Uncaught Exception",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u003c/p\u003e\u003cp\u003eAVEVA further recommends users follow general defensive measures:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eMonitor liveness of PI Network Manager and PI Archive Subsystem services.\u003c/li\u003e\n\u003cli\u003eSet the PI Network Manager and PI Archive Subsystem services to automatically restart.\u003c/li\u003e\n\u003cli\u003eLimit Port 5450 access to trusted workstations and software.\u003c/li\u003e\n\u003cli\u003eFor a list of PI System firewall port requirements, see knowledge base article \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB01162\"\u003eKB01162 - Firewall Port Requirements\u003c/a\u003e.\u003c/li\u003e\u003c/ul\u003e\u003cli\u003eImpact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization\u0027s architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.\u003c/li\u003e\u003cli\u003eFor a starting point on PI System security best practices, see knowledge base article \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB00833\"\u003eKB00833 - Seven best practices for securing your PI Server\u003c/a\u003e.\u003c/li\u003e\u003cp\u003eFor additional information please refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\"\u003eAVEVA-2025-001\u003c/a\u003e.\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\n\nAVEVA further recommends users follow general defensive measures:\n\n\n\n  *  Monitor liveness of PI Network Manager and PI Archive Subsystem services.\n\n  *  Set the PI Network Manager and PI Archive Subsystem services to automatically restart.\n\n  *  Limit Port 5450 access to trusted workstations and software.\n\n  *  For a list of PI System firewall port requirements, see knowledge base article  KB01162 - Firewall Port Requirements https://customers.osisoft.com/s/knowledgearticle .\n\n\n  *  Impact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization\u0027s architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.\n  *  For a starting point on PI System security best practices, see knowledge base article  KB00833 - Seven best practices for securing your PI Server https://customers.osisoft.com/s/knowledgearticle .\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ ."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2025-36539",
    "datePublished": "2025-06-12T19:56:33.320Z",
    "dateReserved": "2025-04-21T19:39:54.984Z",
    "dateUpdated": "2025-06-12T20:04:23.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-44019 (GCVE-0-2025-44019)

Vulnerability from nvd – Published: 2025-06-12 19:51 – Updated: 2025-06-12 20:06
VLAI?
Title
AVEVA PI Data Archive Uncaught Exception
Summary
AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service. Depending on the timing of the crash, data present in snapshots/write cache may be lost.
CWE
Assigner
Impacted products
Credits
AVEVA reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-44019",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-12T20:06:34.741269Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-12T20:06:50.361Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 4",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Data Archive",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023 Patch 1"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "lessThanOrEqual": "2018 SP3 Patch 6",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "AVEVA",
          "versions": [
            {
              "status": "affected",
              "version": "2023 Patch 1"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "AVEVA reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if \nexploited, could allow an authenticated user to shut down certain \nnecessary PI Data Archive subsystems, resulting in a denial of service. \nDepending on the timing of the crash, data present in snapshots/write \ncache may be lost."
            }
          ],
          "value": "AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if \nexploited, could allow an authenticated user to shut down certain \nnecessary PI Data Archive subsystems, resulting in a denial of service. \nDepending on the timing of the crash, data present in snapshots/write \ncache may be lost."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-248",
              "description": "CWE-248",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-12T19:59:08.542Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-07"
        },
        {
          "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/"
        },
        {
          "url": "https://my.osisoft.com/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u003c/p\u003e\u003cp\u003eAll affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSISoft Customer Portal\u003c/a\u003e, search for \"AVEVA PI Server\" and select version 2024 or higher.\u003c/p\u003e\u003cp\u003ePI Data Archive 2018 SP3 Patch 4 and all prior and \nPI Server 2018 SP3 Patch 6 and all prior can alternatively be fixed by \nupgrading to PI Server 2018 SP3 Patch 7 or higher. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSISoft Customer Portal\u003c/a\u003e, search for \"AVEVA PI Server\" and select Version 2018 SP3 Patch 7 or higher.\u003c/p\u003e\u003cp\u003eFor additional information please refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\"\u003eAVEVA-2025-001\u003c/a\u003e.\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\n\nAll affected versions of PI Data \nArchive and PI Server can be fixed by upgrading to PI Server 2024 or \nhigher. From  OSISoft Customer Portal https://my.osisoft.com/ , search for \"AVEVA PI Server\" and select version 2024 or higher.\n\nPI Data Archive 2018 SP3 Patch 4 and all prior and \nPI Server 2018 SP3 Patch 6 and all prior can alternatively be fixed by \nupgrading to PI Server 2018 SP3 Patch 7 or higher. From  OSISoft Customer Portal https://my.osisoft.com/ , search for \"AVEVA PI Server\" and select Version 2018 SP3 Patch 7 or higher.\n\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ ."
        }
      ],
      "source": {
        "advisory": "ICSA-25-162-07",
        "discovery": "INTERNAL"
      },
      "title": "AVEVA PI Data Archive Uncaught Exception",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u0026nbsp;\u003c/p\u003e\u003cp\u003eAVEVA further recommends users follow general defensive measures:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eMonitor liveness of PI Network Manager and PI Archive Subsystem services.\u003c/li\u003e\n\u003cli\u003eSet the PI Network Manager and PI Archive Subsystem services to automatically restart.\u003c/li\u003e\n\u003cli\u003eLimit Port 5450 access to trusted workstations and software.\u003c/li\u003e\n\u003cli\u003eFor a list of PI System firewall port requirements, see knowledge base article \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB01162\"\u003eKB01162 - Firewall Port Requirements\u003c/a\u003e.\u003c/li\u003e\u003c/ul\u003e\u003cli\u003eImpact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization\u0027s architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.\u003c/li\u003e\n\u003cli\u003eFor a starting point on PI System security best practices, see knowledge base article \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB00833\"\u003eKB00833 - Seven best practices for securing your PI Server\u003c/a\u003e.\n\u003cp\u003e\u003c/p\u003e\u003cp\u003eFor additional information please refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/en/support-and-success/cyber-security-updates/\"\u003eAVEVA-2025-001\u003c/a\u003e.\n\n\u003c/p\u003e\n\n\u003c/li\u003e\u003cli\u003e\u003cbr\u003e\u003c/li\u003e"
            }
          ],
          "value": "AVEVA recommends that organizations evaluate the impact of these \nvulnerabilities based on their operational environment, architecture, \nand product implementation. Users with affected product versions should \napply security updates to mitigate the risk of exploit.\u00a0\n\nAVEVA further recommends users follow general defensive measures:\n\n\n\n  *  Monitor liveness of PI Network Manager and PI Archive Subsystem services.\n\n  *  Set the PI Network Manager and PI Archive Subsystem services to automatically restart.\n\n  *  Limit Port 5450 access to trusted workstations and software.\n\n  *  For a list of PI System firewall port requirements, see knowledge base article  KB01162 - Firewall Port Requirements https://customers.osisoft.com/s/knowledgearticle .\n\n\n  *  Impact and severity of vulnerabilities can be reduced through \nindustry accepted IT practices. Please consult your IT engineer for \nadvice on how to best implement these firewall restrictions in your \norganization\u0027s architecture. OSIsoft technical support provides guidance\n on architectural approaches, backup procedures, network defenses, and \noperating system configuration.\n\n  *  For a starting point on PI System security best practices, see knowledge base article  KB00833 - Seven best practices for securing your PI Server https://customers.osisoft.com/s/knowledgearticle .\n\n\nFor additional information please refer to  AVEVA-2025-001 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .\n\n\n\n\n\n\n  *"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2025-44019",
    "datePublished": "2025-06-12T19:51:56.663Z",
    "dateReserved": "2025-04-21T19:39:54.994Z",
    "dateUpdated": "2025-06-12T20:06:50.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34348 (GCVE-0-2023-34348)

Vulnerability from nvd – Published: 2024-01-18 17:16 – Updated: 2024-10-21 11:44
VLAI?
Title
Improper Check or Handling of Exceptional Conditions in Aveva PI Server
Summary
AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.
CWE
  • CWE-703 - Improper Check or Handling of Exceptional Conditions
Assigner
References
Impacted products
Vendor Product Version
Aveva PI Server Affected: 2023
Affected: 0 , ≤ 2018 SP3 P05 (custom)
Create a notification for this product.
Credits
Aveva
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:10:06.138Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "government-resource",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34348",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-23T05:01:34.023375Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-754",
                "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T11:44:39.250Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "Aveva",
          "versions": [
            {
              "status": "affected",
              "version": "2023"
            },
            {
              "lessThanOrEqual": "2018 SP3 P05 ",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Aveva"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eAVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.\u003c/p\u003e\u003cbr\u003e\n\n"
            }
          ],
          "value": "\nAVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.\n\n\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-703",
              "description": "CWE-703: Improper Check or Handling of Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-18T17:16:50.038Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "government-resource"
          ],
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eAll affected versions can be fixed by upgrading to AVEVA PI Server version 2023 Patch 1 or later. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSI Soft Customer Portal\u003c/a\u003e, search for \u201cPI Server\u201d and select version \u201c2023 Patch 1\u201d.\u003c/p\u003e\u003cp\u003eFor an alternative fix, AVEVA PI Server 2018 SP3 Patch 5 and prior can be fixed by deploying AVEVA PI Server version 2018 SP3 Patch 6 or later. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSI Soft Customer Portal\u003c/a\u003e, search for \u201cPI Server\u201d and select version \u201c2018 SP3 Patch 6\u201d.\u003c/p\u003e\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible.\u003c/p\u003e\u003cp\u003eAVEVA recommends the following defensive measures:\u003c/p\u003e\u003cul\u003e\u003cli\u003eSet the PI Message Subsystem to auto restart.\u003c/li\u003e\u003cli\u003eMonitor the memory usage of the PI Message Subsystem.\u003c/li\u003e\u003cli\u003eLimit network access to port 5450 to trusted workstations and software\u003c/li\u003e\u003cli\u003eConfirm that only authorized users have access to write to the PI Server Message Log. This is done through configuration of the PIMSGSS entry within the Database Security plugin accessible through PI System Management Tools.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eFor more information on this vulnerability, including security updates, users should see security bulletin \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-001.pdf\"\u003eAVEVA-2024-001\u003c/a\u003e.\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nAll affected versions can be fixed by upgrading to AVEVA PI Server version 2023 Patch 1 or later. From  OSI Soft Customer Portal https://my.osisoft.com/ , search for \u201cPI Server\u201d and select version \u201c2023 Patch 1\u201d.\n\nFor an alternative fix, AVEVA PI Server 2018 SP3 Patch 5 and prior can be fixed by deploying AVEVA PI Server version 2018 SP3 Patch 6 or later. From  OSI Soft Customer Portal https://my.osisoft.com/ , search for \u201cPI Server\u201d and select version \u201c2018 SP3 Patch 6\u201d.\n\nAVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible.\n\nAVEVA recommends the following defensive measures:\n\n  *  Set the PI Message Subsystem to auto restart.\n  *  Monitor the memory usage of the PI Message Subsystem.\n  *  Limit network access to port 5450 to trusted workstations and software\n  *  Confirm that only authorized users have access to write to the PI Server Message Log. This is done through configuration of the PIMSGSS entry within the Database Security plugin accessible through PI System Management Tools.\n\n\nFor more information on this vulnerability, including security updates, users should see security bulletin  AVEVA-2024-001 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-001.pdf .\n\n\n\n\n"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper Check or Handling of Exceptional Conditions in Aveva PI Server ",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2023-34348",
    "datePublished": "2024-01-18T17:16:50.038Z",
    "dateReserved": "2023-07-12T18:40:13.110Z",
    "dateUpdated": "2024-10-21T11:44:39.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31274 (GCVE-0-2023-31274)

Vulnerability from nvd – Published: 2024-01-18 17:15 – Updated: 2024-08-29 20:02
VLAI?
Title
Missing Release of Resource after Effective Lifetime vulnerability in Aveva PI Server
Summary
AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to cause the PI Message Subsystem of a PI Server to consume available memory resulting in throttled processing of new PI Data Archive events and a partial denial-of-service condition.
CWE
  • CWE-772 - Missing Release of Resource after Effective Lifetime
Assigner
References
Impacted products
Vendor Product Version
Aveva PI Server Affected: 2023
Affected: 0 , ≤ 2018 SP3 P05 (custom)
Create a notification for this product.
Credits
Aveva
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:30.876Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "government-resource",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31274",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-23T05:01:33.321397Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-29T20:02:08.687Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PI Server",
          "vendor": "Aveva",
          "versions": [
            {
              "status": "affected",
              "version": "2023"
            },
            {
              "lessThanOrEqual": "2018 SP3 P05 ",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Aveva"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eAVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to cause the PI Message Subsystem of a PI Server to consume available memory resulting in throttled processing of new PI Data Archive events and a partial denial-of-service condition.\u003c/p\u003e\u003cbr\u003e\n\n"
            }
          ],
          "value": "\nAVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to cause the PI Message Subsystem of a PI Server to consume available memory resulting in throttled processing of new PI Data Archive events and a partial denial-of-service condition.\n\n\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-772",
              "description": "CWE-772 Missing Release of Resource after Effective Lifetime",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-18T17:15:25.837Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "government-resource"
          ],
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eAll affected versions can be fixed by upgrading to AVEVA PI Server version 2023 Patch 1 or later. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSI Soft Customer Portal\u003c/a\u003e, search for \u201cPI Server\u201d and select version \u201c2023 Patch 1\u201d.\u003c/p\u003e\u003cp\u003eFor an alternative fix, AVEVA PI Server 2018 SP3 Patch 5 and prior can be fixed by deploying AVEVA PI Server version 2018 SP3 Patch 6 or later. From \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://my.osisoft.com/\"\u003eOSI Soft Customer Portal\u003c/a\u003e, search for \u201cPI Server\u201d and select version \u201c2018 SP3 Patch 6\u201d.\u003c/p\u003e\u003cp\u003eAVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible.\u003c/p\u003e\u003cp\u003eAVEVA recommends the following defensive measures:\u003c/p\u003e\u003cul\u003e\u003cli\u003eSet the PI Message Subsystem to auto restart.\u003c/li\u003e\u003cli\u003eMonitor the memory usage of the PI Message Subsystem.\u003c/li\u003e\u003cli\u003eLimit network access to port 5450 to trusted workstations and software\u003c/li\u003e\u003cli\u003eConfirm that only authorized users have access to write to the PI Server Message Log. This is done through configuration of the PIMSGSS entry within the Database Security plugin accessible through PI System Management Tools.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eFor more information on this vulnerability, including security updates, users should see security bulletin \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-001.pdf\"\u003eAVEVA-2024-001\u003c/a\u003e.\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nAll affected versions can be fixed by upgrading to AVEVA PI Server version 2023 Patch 1 or later. From  OSI Soft Customer Portal https://my.osisoft.com/ , search for \u201cPI Server\u201d and select version \u201c2023 Patch 1\u201d.\n\nFor an alternative fix, AVEVA PI Server 2018 SP3 Patch 5 and prior can be fixed by deploying AVEVA PI Server version 2018 SP3 Patch 6 or later. From  OSI Soft Customer Portal https://my.osisoft.com/ , search for \u201cPI Server\u201d and select version \u201c2018 SP3 Patch 6\u201d.\n\nAVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Customers using affected products should apply security updates as soon as possible.\n\nAVEVA recommends the following defensive measures:\n\n  *  Set the PI Message Subsystem to auto restart.\n  *  Monitor the memory usage of the PI Message Subsystem.\n  *  Limit network access to port 5450 to trusted workstations and software\n  *  Confirm that only authorized users have access to write to the PI Server Message Log. This is done through configuration of the PIMSGSS entry within the Database Security plugin accessible through PI System Management Tools.\n\n\nFor more information on this vulnerability, including security updates, users should see security bulletin  AVEVA-2024-001 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-001.pdf .\n\n\n\n\n"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Missing Release of Resource after Effective Lifetime vulnerability in Aveva PI Server ",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2023-31274",
    "datePublished": "2024-01-18T17:15:25.837Z",
    "dateReserved": "2023-07-12T18:40:13.101Z",
    "dateUpdated": "2024-08-29T20:02:08.687Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}