CVE-2022-0835

8.1 HIGH

📋 TL;DR

AVEVA System Platform 2020 stores sensitive information in cleartext, allowing attackers or low-privileged users to access credentials and other confidential data. This affects organizations using AVEVA System Platform 2020 for industrial control systems.

💻 Affected Systems

Products:
  • AVEVA System Platform
Versions: 2020 version
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of AVEVA System Platform 2020 where sensitive data is stored without encryption.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to industrial control systems, potentially causing operational disruption, data theft, or safety incidents.

🟠

Likely Case

Unauthorized users access sensitive configuration data, credentials, or system information, leading to privilege escalation or further attacks.

🟢

If Mitigated

Limited exposure with proper access controls, but cleartext storage remains a persistent risk if systems are compromised.

🌐 Internet-Facing: MEDIUM - Systems exposed to internet are vulnerable if other attack vectors exist, but direct internet exploitation is unlikely without initial access.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can easily access cleartext data once they have system access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of system access but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version as specified in vendor advisory

Vendor Advisory: https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-007.pdf

Restart Required: Yes

Instructions:

1. Download the latest patch from AVEVA support portal. 2. Backup system configuration. 3. Apply patch following vendor instructions. 4. Restart affected services. 5. Verify encryption of sensitive data.

🔧 Temporary Workarounds

Restrict File Access Permissions

windows

Limit access to directories containing cleartext sensitive data to only necessary administrative accounts.

icacls "C:\ProgramData\AVEVA\SystemPlatform\" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"

Implement File System Auditing

windows

Enable auditing on sensitive directories to detect unauthorized access attempts.

auditpol /set /subcategory:"File System" /success:enable /failure:enable

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all user accounts
  • Deploy additional monitoring and alerting for access to sensitive data directories

🔍 How to Verify

Check if Vulnerable:

Check for cleartext storage in AVEVA System Platform configuration files and data directories for sensitive information like passwords or credentials.

Check Version:

Check AVEVA System Platform version through Control Panel > Programs and Features or using vendor-specific version check tools.

Verify Fix Applied:

Verify that sensitive data in AVEVA System Platform directories is encrypted or properly protected after patch application.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to AVEVA System Platform directories
  • File access events on sensitive configuration files

Network Indicators:

  • Unusual authentication patterns to AVEVA systems
  • Data exfiltration from AVEVA servers

SIEM Query:

EventID=4663 AND ObjectName LIKE "%AVEVA%SystemPlatform%" AND Accesses="ReadData"

🔗 References

📤 Share & Export