In OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, deletion, or modification.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
osisoft pi api |
||
osisoft pi buffer subsystem |
||
osisoft pi connector |
||
osisoft pi connector relay |
||
osisoft pi data archive |
||
osisoft pi data collection manager |
||
osisoft pi integrator |
||
osisoft pi interface configuration utility |
||
osisoft pi to ocs |