{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T11:54:01.870","vulnerabilities":[{"cve":{"id":"CVE-2023-33873","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2023-11-15T17:15:41.313","lastModified":"2024-11-21T08:06:06.847","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nThis privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.\n\n"},{"lang":"es","value":"Esta vulnerabilidad de escalada de privilegios, si se explota, en la nube permite que un usuario local autenticado en el sistema operativo con privilegios estándar escale a privilegios del sistema en la máquina donde están instalados estos productos, lo que resulta en un compromiso total de la máquina de destino."}],"metrics":{"cvssMetricV31":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-250"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:batch_management:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"5C2AEDAE-18DB-40C0-AFB0-57136A822BBE"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:batch_management:2020:-:*:*:*:*:*:*","matchCriteriaId":"F546770E-B402-4577-8E0D-C7D34CFDE549"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:batch_management:2020:sp1:*:*:*:*:*:*","matchCriteriaId":"6A67B8AC-2282-4F39-9795-D61F48304049"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:communication_drivers:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"D62B3995-706D-4285-A3C7-900ED2D176B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:communication_drivers:2020:-:*:*:*:*:*:*","matchCriteriaId":"D97EE6DC-CCB3-40FF-BC75-A694DCBCE50D"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:communication_drivers:2020:r2:*:*:*:*:*:*","matchCriteriaId":"B74F0988-CB5D-4FC4-8CBD-6B43F6CB4C22"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:communication_drivers:2020:r2_p01:*:*:*:*:*:*","matchCriteriaId":"B38368FD-D573-4C6A-BBB7-B0CC477C44AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:edge:*:*:*:*:*:*:*:*","versionEndIncluding":"20.1.101","matchCriteriaId":"6CE5AEFF-0C5F-499C-B4AF-3594CC591061"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:enterprise_licensing:*:*:*:*:*:*:*:*","versionEndIncluding":"3.7.002","matchCriteriaId":"9D63D153-5F92-4732-8CE7-BF821FDC1FFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:historian:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"310008CD-1FB4-47C3-9B20-1DF0BC537019"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:historian:2020:-:*:*:*:*:*:*","matchCriteriaId":"33FE93BF-8221-4A84-845B-13693E28F570"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:historian:2020:r2:*:*:*:*:*:*","matchCriteriaId":"D479F013-5ABC-4B59-845A-E06EF0ADF107"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:historian:2020:r2_p01:*:*:*:*:*:*","matchCriteriaId":"5B67B330-EB63-4026-A961-EA2EE76A8355"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:intouch:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"06F39A93-CE38-4696-A301-3B08BB02AA0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:intouch:2020:-:*:*:*:*:*:*","matchCriteriaId":"87B6DFEA-FED8-4A02-B09A-2676D5C8A5DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:intouch:2020:r2:*:*:*:*:*:*","matchCriteriaId":"A3FDBC50-37E5-4F02-BDAC-22490D139C71"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:intouch:2020:r2_p01:*:*:*:*:*:*","matchCriteriaId":"A7D7123E-2439-4325-9733-F10DFF180C35"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:manufacturing_execution_system:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"E5519C16-D78F-4B03-BF68-25977782C15C"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*","matchCriteriaId":"1288B3F5-2A5F-4516-96F8-FDB33A71060A"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:manufacturing_execution_system:2020:p01:*:*:*:*:*:*","matchCriteriaId":"353CAFF0-2928-46F1-B5B5-9F0122BCDF38"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:mobile_operator:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"2244B652-6874-4BD3-9F6A-C01274CE7F25"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:mobile_operator:2020:*:*:*:*:*:*:*","matchCriteriaId":"40D03AD9-31E2-422F-9137-4E881A942C74"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:*","matchCriteriaId":"B9AA5D22-126E-4E0B-AD44-8990B9218AA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:mobile_operator:2020:r1:*:*:*:*:*:*","matchCriteriaId":"062CEF6D-5308-4CC7-A20A-84298C527C14"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:plant_scada:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"63BCBC30-F337-47AB-96F1-54E46F735B1E"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:plant_scada:2020:-:*:*:*:*:*:*","matchCriteriaId":"7B493552-4A0D-49DC-8669-C7E714669D98"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:plant_scada:2020:r2:*:*:*:*:*:*","matchCriteriaId":"2B714DE8-6E27-48ED-8CB5-6FD3DECB8718"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:recipe_management:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"4FF7755E-D26A-4D55-88BB-2811A18C2589"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:recipe_management:2020:-:*:*:*:*:*:*","matchCriteriaId":"5B0AB6DC-D05F-429F-9FEF-500BE9780456"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:recipe_management:2020:update_1_patch_2:*:*:*:*:*:*","matchCriteriaId":"8E69E722-AA58-49BD-9D22-5A6DC40FE85F"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:system_platform:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"18048EB2-8F4C-4C75-93BD-0C3D6C42AB4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*","matchCriteriaId":"D47F4B07-B67F-4855-AED2-D17B0E76FA8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*","matchCriteriaId":"1ED7E9C7-B882-4F57-B796-59A4F90EE185"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*","matchCriteriaId":"33D5FF9C-590D-4BA3-A265-35956E4F36DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:telemetry_server:2020r2:-:*:*:*:*:*:*","matchCriteriaId":"12AD341A-07AE-4837-A1DC-471FFF0926DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:telemetry_server:2020r2:sp1:*:*:*:*:*:*","matchCriteriaId":"62A91A30-CB69-4E14-9C32-BF848E740944"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:work_tasks:*:*:*:*:*:*:*:*","versionEndExcluding":"2020","matchCriteriaId":"061DD968-A34E-4AA2-B0EC-ECBAF4B15605"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*","matchCriteriaId":"78E65146-9CB1-423B-A565-48530C453382"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*","matchCriteriaId":"64EF2703-3C49-468A-ADA9-E78173DF4F65"},{"vulnerable":true,"criteria":"cpe:2.3:a:aveva:work_tasks:2020:update_2:*:*:*:*:*:*","matchCriteriaId":"4131B6FF-AF15-4F52-9415-A9E150B169DD"}]}]}],"references":[{"url":"https://www.aveva.com/en/support-and-success/cyber-security-updates/","source":"ics-cert@hq.dhs.gov","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-318-01","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.aveva.com/en/support-and-success/cyber-security-updates/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-318-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}