CVE-2023-6061 Vulnerability Details

  /     /     /  

CVE-2023-6061 Metadata Quick Info

CVE Published: 07/12/2023 | CVE Updated: 02/12/2024 | CVE Year: 2023
Source: palo_alto | Vendor: ICONICS | Product: SCADA software Iconics Suite
Status : PUBLISHED

CVE-2023-6061 Description

Multiple components of Iconics SCADA Suite are prone to a Phantom DLL loading vulnerability. This issue arises from the applications improperly searching for and loading dynamic link libraries, potentially allowing an attacker to execute malicious code via a DLL with a matching name in an accessible search path. The affected components are: * MMXFax.exe * winfax.dll * MelSim2ComProc.exe * Sim2ComProc.dll * MMXCall_in.exe * libdxxmt.dll * libsrlmt.dll

Metrics

CVSS Version: 3.1 | Base Score: 6.6 MEDIUM
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* REQUIRED
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-427
CWE Name: CWE-427 Uncontrolled Search Path Element
Source: ICONICS

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-641
CAPEC Description: CAPEC-641 DLL Side-Loading


Source: NVD (National Vulnerability Database).